How to use AWS Config to determine compliance of AWS KMS key policies to your specifications
Amazon Web Services FeedHow to use AWS Config to determine compliance of AWS KMS key policies to your specifications One of the top security methodologies is the principle of least privilege, which is the practice of limiting user, application, and service permissions to only those necessary to perform a function or task. In this post,…