Information Leakage in AWS Resource-Based Policy APIs
AWS IAM Policy Explained
An overview of AWS IAM
Creating an AWS IAM policy: AWS Security
How to use resource-based policies in the AWS Secrets Manager console to securely access secrets across AWS accounts | Noise
Policies and permissions in IAM - AWS Identity and Access Management
AWS HandsOn Identity and Resource Based Policy - YouTube
AWS IAM Policy Explained
Unit 42 Cloud Threat Report: Misconfigured IAM Roles Lead to Thousands of Compromised Cloud Workloads
The structure of a resource-based policy | AWS Certified Security – Specialty Exam Guide
AWS IAM Policies and Policy Structure
Easy way to understand AWS IAM permissions and policy
Ben Kehoe on Twitter: "Relevant policy evaluation diagram. Resource policy allows short-circuit the decision before permissions boundaries are evaluated. https://t.co/9EPqorfQv0" / Twitter
Information Leakage in AWS Resource-Based Policy APIs
IAM Authorization Hierarchy - CloudThat Resources
Identity vs resource-based AWS IAM policies | Blog
Identity-based policies and resource-based policies - AWS Identity and Access Management