You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: Sensitive-data-protection/README.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@
3
3
Implement controls that protect your sensitive data, that should not be made publicly accessible or deleted intentionally or unintentionally.
4
4
5
5
6
-
| Included Policy |Rational|
6
+
| Included Policy |Rationale|
7
7
|------|-------------|
8
8
|[Deny resource sharing through AWS Resource access manager outside your organization](https://docs.aws.amazon.com/organizations/latest/userguide/orgs_manage_policies_scps_examples_ram.html#example_ram_1)| Deny users from creating resource shares using AWS RAM that allow sharing with IAM users and roles that aren't part of the organization.|
9
9
|[Deny users from deleting Amazon Glacier vaults or archives](Deny-users-from-deleting-Amazon-Glacier-vaults-or-archives.json)| Restrict users or roles in any affected account from deleting any S3 Glacier vaults or archives.Consider replacing "Resource":"*" with specific sensitive Glacier vaults/archive resources to allow developers freedom to manage other vaults/archives.|
0 commit comments