Top Rated AWS Cloud Security: Security, Identity and Compliance Alternatives

I used guard duty n inspector n these are very good services, they can provide security alerts after scanning aws resources. Review collected by and hosted on G2.com.
Nothing to say everything work at very nice level Review collected by and hosted on G2.com.
572 out of 573 Total Reviews for AWS Cloud Security: Security, Identity and Compliance
Overall Review Sentiment for AWS Cloud Security: Security, Identity and Compliance
Log in to view review sentiment.
Highly scalable and able to handle millions of users with ease which makes it suitable for both small-scale and enterprise-grade applications. Built-in authentication features like MFA, account recovery, and password policy enforcement, tend to be an all-in-one place. Customisation of authentication flows using AWS Lambda triggers makes it easy to accommodate different use cases. Integration with AWS services by native provides a seamless end-to-end solution as it lies under the AWS ecosystem. Cross-platform SDKs available for Web, Mobile(Android, iOS), and RESTful APIs simplified the implementation. Supports integration for third-party identity providers. Review collected by and hosted on G2.com.
The initial setup was tedious and challenging, especially dealing with the IAM policies. Error handling and debugging are very hard where the underlying layer is managed by AWS and needs strong expertise in the AWS ecosystem to even look into logs. Non-user-friendly documentation will confuse with developer who deals with the setup at the initial stage. The option to export the user's data is not there and updating the users in bulk option is also not available. Sometimes "List users" method returns deleted accounts for a few minutes(or hours) from the cache causing some confusion during data validation. Review collected by and hosted on G2.com.

Monitoring is one part which is very essentials eg, VPC flow logs, s3 logs, API logs, system logs with aggregators etc . But analysing the logs as centralized hub , security hub provides the context. Along side coming to compliance , macie with its AI ML models , able to identify PII in S3. More that these, custome logs can also be formatter into ASAF using services like Lamba intervined. Which threat own threat intelligence capablitiy and custom integration to SIEM solution offers visibility across the environment. Apart from service, aws provides a lot of resources for industary standards and that keeps us upto date and skilled. Support is alwasys a second option , as I get everything from easy documented materials. Day to day getting used, gave a clear explames of scenarios where I can act upon a breach or an event with the available service. which helped me to understand the risks and what security controls are needed. Review collected by and hosted on G2.com.
Image recongnikition where photocopies of Sensitive information are elsewhere, not sure where to get the docs. But with few service capablities, was able to do it. Review collected by and hosted on G2.com.

IAM has roles, policies and users which we can manage all in one place, I can allow some resource to access read write another resource or I can allow one user access to something or not. It helps a lot with access management while using lambda functions. Not every lambda has to have access to everything. It is very frequently used to give access to lambda functions. The integration is very easy it is directly attached using the console and needs policy names on SAM templates to give access. Review collected by and hosted on G2.com.
It is a sopisticated program, works all of the time, but writing custom policies and attaching inline policies could have been made easier with policy builders but you can do that already upto some extent. Implementation on SAM templates could have been easier. Review collected by and hosted on G2.com.

Eventhough other security services in aws helps me in aggregate logs from events, and Macie for compliace buf fortunalety to be proactive instead of being reactive always security hub seems pretty friedly choice. Implementation and integration are easy and well documented. No worries about the support as AWS itself community friendly . For me its a daily routine. Review collected by and hosted on G2.com.
NA. But sometimes, finding scenario based setups are quite rare. Review collected by and hosted on G2.com.

IAM makes access management very easy and enable it pod level and as well as application level. It gives better security to avoid unauthorised access. Review collected by and hosted on G2.com.
Nothing as such about IAM, very useful feature. Review collected by and hosted on G2.com.
I like the feature where you can create user groups so that you create a policy once and that can be applied to multiple users at once. One user can also belong to multiple groups which again makes it easier to assign different policies for the same user Review collected by and hosted on G2.com.
I personally felt the billing split for the users and the services they should be more detailed. I don't if it's the UI issue or the issue with feature itseld but sometimes I can't figure how to to exactly see how much a specific user has spent on a specific service Review collected by and hosted on G2.com.
Aws identity and Access Management(IAM) is easy to use and you can manage role, policies and permission via Management console as well as CLI. We can also integration third party identity provider. It provides detailed logging of user activity. Review collected by and hosted on G2.com.
AWS identity and Access Management(IAM) does not support application and SSO feature. It is only Limited to managing access to AWS resources. Also you can only create limited number of groups and users by default. It is Complex to set up and manage for larger organizations. Review collected by and hosted on G2.com.
AWS IAM provides and suit for managing users for your specific domain and organization, the best part is we can Give User based and Role based acess control to maintain security, AWS IAM makes easy to assign specific privileges to an user ,exept this AWS IAM have rich features like policy alocation and many more. Review collected by and hosted on G2.com.
sometimes aws IAM lacks support because of limited resources. they should improve it Review collected by and hosted on G2.com.

AWS cloud security provides better security and identity management which allows user for accessing the instances very easily Review collected by and hosted on G2.com.
need improvement in refresh rate in user interface. when we start to create AMI of instance its loading time may be reduced. Review collected by and hosted on G2.com.

AWS WAF protects web applications from common web exploities. The user can create a policy and take control over the block and filters. AWS WAF can easily be integrated and managed by the Amazon firewall manager and can be easily implemented in the Amazon cloud platform. The user can monitor and frequently analyze the incoming network traffic. Customer support is very responsive and satisfactory which help the user to fix issues in less time. Review collected by and hosted on G2.com.
The pricing of AWS WAF is based on the components like Web ACL, Rule, Bot control and fraud Control. which make a user to pay part by part which is bit annoying. Review collected by and hosted on G2.com.