Breaking News: Grepper is joining You.com. Read the official announcement!
Check it out

Security and Access Control

Pragya Keshap answered on February 21, 2023 Popularity 8/10 Helpfulness 1/10

Contents


More Related Answers

  • access control allow headers
  • access-control-allow-methods
  • database security
  • Accessing Access Control
  • How do you enforce access control to the data, based on existing access control policies and user credentials?
  • What is the Security Rule for handling authorization?
  • security management
  • access-control-allow-methods

  • Security and Access Control

    0

    First of all in order to be able to create an EFS file system, you need to have Allow permissions to a series of actions like CreateFileSystem and CreateMountTarget ( among others)

    IAM policies can be used to control who can administer the file system.

    Security groups control network traffic that is allowed to reach the file system ( remember that Security Group act like a firewall) therefore are usefule to control control what NFS clients that can access your file system ( inbound rule of type NFS with a source either the security group of your instances or their IPs)

    You can control who can have access to what files and directories with POSIX-compliant user and group-level permissions.

    Popularity 8/10 Helpfulness 1/10 Language whatever
    Source: Grepper
    Link to this answer
    Share Copy Link
    Contributed on Feb 21 2023
    Pragya Keshap
    0 Answers  Avg Quality 2/10


    X

    Continue with Google

    By continuing, I agree that I have read and agree to Greppers's Terms of Service and Privacy Policy.
    X
    Grepper Account Login Required

    Oops, You will need to install Grepper and log-in to perform this action.