An IAM identity with specific permissions that can be assumed by trusted entities. Unlike users, roles do not have permanent credentials. They provide temporary security credentials for the session.
A service that provisions, manages, and deploys SSL/TLS certificates for use with AWS services and your internal resources. ACM removes the time-consuming manual process of purchasing, uploading, and renewing certificates.
A service that provides authentication, authorization, and user management for web and mobile apps. Users can sign in with a username and password or through a third-party identity provider like Google or Facebook.
A threat detection service that continuously monitors for malicious activity and unauthorized behavior. Analyzes CloudTrail events, VPC Flow Logs, and DNS logs to identify potential threats.
A service that helps you securely control access to AWS resources. Use IAM to manage users, groups, roles, and policies that determine who can access which resources and what actions they can perform.
A JSON document that defines permissions for AWS resources. Policies specify which actions are allowed or denied on which resources under what conditions. Can be attached to users, groups, or roles.