April 22, 2025

Category: Identity and Access Management

  • Securely manage identities and access to AWS services and resources: AWS Identity and Access Management (IAM)
  • Centrally manage workforce access to multiple AWS accounts and applications: AWS IAM Identity Center (successor to SSO)
  • Implement secure, frictionless customer identity and access management that scales: Amazon Cognito
  • Manage fine-grained permissions and authorization within custom applications: Amazon Verified Permissions
  • Gain efficiency with a fully managed Microsoft Active Directory service: AWS Directory Service
  • Simply and securely share your AWS resources across multiple accounts: AWS Resource Access Manager
  • Centrally manage your environment as you scale your AWS resources: AWS Organizations

Category: Detection

  • Automate AWS security checks and centralize security alerts: AWS Security Hub
  • Protect AWS accounts with intelligent threat detection: Amazon GuardDuty
  • Automated and continual vulnerability management at scale: Amazon Inspector
  • Automatically centralize your security data in a few steps: Amazon Security Lake
  • Assess, audit, and evaluate configurations of your resources: AWS Config
  • Observe and monitor resources and applications on AWS, on premises, and on other clouds: Amazon CloudWatch
  • Track user activity and API usage: AWS CloudTrail
  • Security management across your IoT devices and fleets: AWS IoT Device Defender

Category: Network and Application Protection

  • Centrally configure and manage firewall rules across your accounts: AWS Firewall Manager
  • Deploy network firewall security across your VPCs: AWS Network Firewall
  • Maximize application availability and responsiveness with managed DDoS protection: AWS Shield
  • Provide secure access to corporate applications without a VPN: AWS Verified Access
  • Protect your web applications from common exploits: AWS Web Application Firewall (WAF)
  • Filter and control outbound DNS traffic for your VPCs: Amazon Route 53 Resolver DNS Firewall

Category: Data Protection

  • Discover and protect your sensitive data at scale: Amazon Macie
  • Create and control keys to encrypt or digitally sign your data: AWS Key Management Service (AWS KMS)
  • Manage single-tenant hardware security modules (HSMs) on AWS: AWS CloudHSM
  • Provision and manage SSL/TLS certificates with AWS services and connected resources: AWS Certificate Manager
  • Simplify cryptography operations in your cloud-hosted payment applications: AWS Payment Cryptography
  • Create private certificates to identify resources and protect data: AWS Private Certificate Authority
  • Centrally manage the lifecycle of secrets: AWS Secrets Manager

Category: Incident Response

  • Analyze and visualize security data to investigate potential security issues: Amazon Detective
  • Scalable, cost-effective application recovery to AWS: AWS Elastic Disaster Recovery

Category: Compliance

  • No cost, self-service portal for on-demand access to AWS’ compliance reports: AWS Artifact
  • Continually audit your AWS usage to simplify risk and compliance assessment: AWS Audit Manager

Category: Compliance

  • Continually audit your AWS usage to simplify risk and compliance assessment: AWS Audit Manager

Category: Infrastructure Protection

  • Monitor and protect your AWS accounts against suspicious activity: AWS GuardDuty
  • Automate security assessment for your AWS resources: AWS Inspector
  • Continuously monitor and secure your AWS resources: AWS Config
  • Manage access and permissions to your AWS resources: AWS Identity and Access Management (IAM)

Category: Data Privacy and Encryption

  • Securely store and manage your encryption keys: AWS Key Management Service (KMS)
  • Encrypt and decrypt data in transit and at rest: AWS Encryption SDK
  • Control access to your data stored in S3: Amazon S3 Access Points and Bucket Policies

Category: Security Analytics and Threat Intelligence

  • Centralize and analyze logs for security monitoring and investigation: Amazon CloudWatch Logs
  • Detect and investigate security incidents with machine learning: Amazon GuardDuty
  • Monitor and analyze network traffic for potential threats: Amazon VPC Traffic Mirroring
  • Gather, analyze, and visualize security data from multiple sources: Amazon Detective
  • Manage and analyze security findings across AWS accounts: AWS Security Hub

Category: Incident Response and Forensics

  • Automate security incident response actions: AWS Systems Manager Automation
  • Investigate security incidents with detailed telemetry data: AWS Security Hub
  • Capture, analyze, and store network traffic for forensic investigations: Amazon VPC Traffic Mirroring

Category: Governance, Risk, and Compliance

  • Manage and enforce security and compliance policies: AWS Config Rules
  • Streamline compliance assessment and reporting: AWS Security Hub
  • Automate security assessments and compliance checks: AWS Security Hub
  • Evaluate and validate your security posture: AWS Trusted Advisor

These are just some of the AWS services available for security, identity, and compliance. Each service offers specific features and capabilities to help you secure your AWS resources and meet your compliance requirements.

About The Author

Leave a Reply

Your email address will not be published. Required fields are marked *