1.
Srisai DN, Rattanapong K. Securing AWS Resources with IAM: Identity-Based Policies, Actions, and Permissions Flow. AIJCST. 2022;4(4):14-22. doi:10.63282/3117-5481/AIJCST-V4I4P102