Back to categories
Security, Identity, and Compliance

Security, Identity, and Compliance

Protect your data, accounts, and workloads with comprehensive security services

22 services
Amazon Cognito

Amazon Cognito

Lets you add user sign-up, sign-in, and access control to your web and mobile apps quickly and easily.

Amazon Detective

Amazon Detective

Makes it easy to analyze, investigate, and quickly identify the root cause of potential security issues or suspicious activities.

Amazon GuardDuty

Amazon GuardDuty

A threat detection service that continuously monitors for malicious activity and unauthorized behavior to protect your AWS accounts, workloads, and data.

Amazon Inspector

Amazon Inspector

An automated security assessment service that helps improve the security and compliance of applications deployed on AWS.

Amazon Macie

Amazon Macie

A fully managed data security and data privacy service that uses machine learning and pattern matching to discover and protect your sensitive data in AWS.

Amazon Security Lake

Amazon Security Lake

Automatically centralizes security data from cloud and on-premises sources into a purpose-built data lake stored in your AWS account.

Amazon Verified Permissions

Amazon Verified Permissions

A scalable permissions management and fine-grained authorization service for the applications that you build.

AWS Artifact

AWS Artifact

A central resource for compliance-related information. It provides on-demand access to AWS security and compliance reports.

AWS Audit Manager

AWS Audit Manager

Helps you continuously audit your AWS usage to simplify how you assess risk and compliance with regulations and industry standards.

AWS Certificate Manager

AWS Certificate Manager

Lets you easily provision, manage, and deploy public and private SSL/TLS certificates for use with AWS services and your internal connected resources.

AWS CloudHSM

AWS CloudHSM

A cloud-based hardware security module (HSM) that enables you to easily generate and use your own encryption keys on the AWS Cloud.

AWS Directory Service

AWS Directory Service

Enables your directory-aware workloads and AWS resources to use managed Active Directory in the AWS Cloud.

AWS Firewall Manager

AWS Firewall Manager

A security management service that allows you to centrally configure and manage firewall rules across your accounts and applications.

AWS Identity and Access Management (IAM)

AWS Identity and Access Management (IAM)

Enables you to manage access to AWS services and resources securely. You can create and manage AWS users and groups, and use permissions to allow and deny their access.

AWS Key Management Service (AWS KMS)

AWS Key Management Service (AWS KMS)

Makes it easy for you to create and manage cryptographic keys and control their use across a wide range of AWS services and in your applications.

AWS Network Firewall

AWS Network Firewall

A managed service that makes it easy to deploy essential network protections for all of your Amazon VPCs.

AWS Resource Access Manager

AWS Resource Access Manager

Helps you securely share your resources across AWS accounts or within your AWS Organization.

AWS Secrets Manager

AWS Secrets Manager

Helps you protect access to your applications, services, and IT resources without the upfront cost and complexity associated with deploying and managing a secrets infrastructure.

AWS Security Hub CSPM

AWS Security Hub CSPM

Gives you a comprehensive view of your security state in AWS and helps you check your compliance with the security industry standards and best practices.

AWS Shield

AWS Shield

A managed Distributed Denial of Service (DDoS) protection service that safeguards applications running on AWS.

AWS IAM Identity Center

AWS IAM Identity Center

The place where you create, or connect, your workforce users once and centrally manage their access to multiple AWS accounts and applications.

AWS WAF

AWS WAF

A web application firewall that helps protect your web applications or APIs against common web exploits that may affect availability, compromise security, or consume excessive resources.