Frontpage
Back
Navigation
Figure 4
«
Previous
|
AWS security scans with Scout2
|
Next image
»
Figure 4: Creating the access key and secret key for your IAM user.