Security, Identity, and Compliance

AWS security services from authentication to threat detection, including IAM, KMS, WAF, and GuardDuty

IAM Access Analyzer iconIAM Access Analyzer SpecializedA service that detects externally accessible resources and unused access permissionsSecurity, Identity, and ComplianceAWS Certificate Manager iconAWS Certificate Manager EssentialA service that automates provisioning, management, and deployment of SSL/TLS certificatesSecurity, Identity, and ComplianceAWS Artifact iconAWS Artifact SpecializedA service for on-demand access to AWS compliance reports and agreementsSecurity, Identity, and ComplianceAWS Audit Manager iconAWS Audit Manager SpecializedA service that automates evidence collection and assessment for compliance auditsSecurity, Identity, and ComplianceAWS CloudHSM iconAWS CloudHSM SpecializedA service for managing encryption keys using dedicated hardware security modulesSecurity, Identity, and ComplianceAmazon Cognito iconAmazon Cognito PopularA service that provides authentication, authorization, and user management for web and mobile applicationsSecurity, Identity, and ComplianceAmazon Detective iconAmazon Detective SpecializedA service that automatically analyzes security findings and investigates root causesSecurity, Identity, and ComplianceAWS Directory Service iconAWS Directory Service SpecializedA service that provides managed Active Directory on AWSSecurity, Identity, and ComplianceAWS Firewall Manager iconAWS Firewall Manager SpecializedA service for centrally managing firewall rules across your entire AWS OrganizationSecurity, Identity, and ComplianceAmazon GuardDuty iconAmazon GuardDuty PopularA machine learning-powered threat detection serviceSecurity, Identity, and ComplianceAWS IAM iconAWS IAM EssentialAn authentication and authorization service for securely managing access to AWS resourcesSecurity, Identity, and ComplianceAWS IAM Identity Center iconAWS IAM Identity Center PopularA service that provides single sign-on to multiple AWS accounts and SaaS applicationsSecurity, Identity, and ComplianceAmazon Inspector iconAmazon Inspector PopularA service that automatically scans EC2 instances, container images, and Lambda functions for vulnerabilitiesSecurity, Identity, and ComplianceAWS KMS iconAWS KMS EssentialA managed encryption key service for securely creating and managing keys used to encrypt dataSecurity, Identity, and ComplianceAmazon Macie iconAmazon Macie SpecializedA service that uses machine learning to automatically discover and protect sensitive data in S3 bucketsSecurity, Identity, and ComplianceAWS Network Firewall iconAWS Network Firewall SpecializedA managed firewall service for fine-grained control of VPC network trafficSecurity, Identity, and ComplianceAWS Payment Cryptography iconAWS Payment Cryptography SpecializedA managed service providing cryptographic key management and operations for payment processingSecurity, Identity, and ComplianceAWS Private Certificate Authority iconAWS Private Certificate Authority SpecializedA managed certificate authority service for issuing and managing private certificatesSecurity, Identity, and ComplianceAWS Resource Access Manager iconAWS Resource Access Manager SpecializedSecurely share AWS resources with other accounts within your organizationSecurity, Identity, and ComplianceAWS Secrets Manager iconAWS Secrets Manager EssentialSecurely manage and automatically rotate database passwords and API keysSecurity, Identity, and ComplianceAWS Security Hub iconAWS Security Hub PopularCentrally manage your AWS security posture and automatically check compliance with best practicesSecurity, Identity, and ComplianceAmazon Security Lake iconAmazon Security Lake NewA data lake service that centralizes security data in OCSF formatSecurity, Identity, and ComplianceAWS Shield iconAWS Shield SpecializedA managed service that protects applications from DDoS attacksSecurity, Identity, and ComplianceAWS Signer iconAWS Signer SpecializedA service that signs and verifies code to ensure only trusted code is deployedSecurity, Identity, and ComplianceAmazon Verified Permissions iconAmazon Verified Permissions NewA service that externalizes application authorization logic using the Cedar policy languageSecurity, Identity, and ComplianceAWS WAF iconAWS WAF PopularA firewall service that protects web applications from malicious trafficSecurity, Identity, and Compliance