Introduction
Introduction to security configuration
AWS secret-based authentication
Manage different users to perform AWS API calls
Policy for all AWS faults
AWS superset policy to execute all AWS faults
Use IAM roles for authentication
Authentication methods