compute, storage, security, monitoring, access management and networks An understanding of IAM principles, tools, role-based access...