A service that helps you protect secrets needed to access your applications, services, and IT resources. Enables you to rotate, manage, and retrieve database credentials, API keys, and other secrets.
A service that provisions, manages, and deploys SSL/TLS certificates for use with AWS services and your internal resources. ACM removes the time-consuming manual process of purchasing, uploading, and renewing certificates.
A service that provides authentication, authorization, and user management for web and mobile apps. Users can sign in with a username and password or through a third-party identity provider like Google or Facebook.
A threat detection service that continuously monitors for malicious activity and unauthorized behavior. Analyzes CloudTrail events, VPC Flow Logs, and DNS logs to identify potential threats.
A service that helps you securely control access to AWS resources. Use IAM to manage users, groups, roles, and policies that determine who can access which resources and what actions they can perform.
A JSON document that defines permissions for AWS resources. Policies specify which actions are allowed or denied on which resources under what conditions. Can be attached to users, groups, or roles.