Top Rated AWS Cloud Security: Security, Identity and Compliance Alternatives
573 AWS Cloud Security: Security, Identity and Compliance Reviews
Overall Review Sentiment for AWS Cloud Security: Security, Identity and Compliance
Log in to view review sentiment.

IAM: AWS IAM provides fine-grained control over user permissions and supports multi-factor authentication (MFA), adding an extra layer of security.
Monitoring and threat detection are one of the best. I used services like Amazon GuardDuty and AWS Security Hub in our organization quite often. Review collected by and hosted on G2.com.
Integrating certain third-party security tools may pose challenges due to compatibility issues or the need for additional configuration.
Some users may find the AWS Cloud Security interface a bit confusing and not very user-friendly. Review collected by and hosted on G2.com.

- Easily Manage and Deploy TLS Certificate
- Supports Both Private and Public Certificate
- Freely available for public TLS Certificate
- Automatic TLS Certificate Renewal Review collected by and hosted on G2.com.
- It does not intergrate with most commonly used Service Amazon EC2.
- It integrats with very limited services.
- We can use AWS Certificate Manager only inside AWS.
- For Importing Public Certificate It does not include autorenewal of certifications.
- Although It has option to generate Certificates outside of ACM and then import it But We can not export ACM Certificate to anywhere outside AWS. Review collected by and hosted on G2.com.
We are using AWS Identity and Access Management (IAM) to provide granular access to work with AWS services to provide just the suitable access at all levels, it is easy to use and on console, even non-IT people are able to get it done, and a number of features are significant from user to a user group or policies for the level access that can be easily implemented and integrated with a number of services, and entry gate to AWS so it is frequently used. Review collected by and hosted on G2.com.
AWS IAM is a must-used service but as you work on it a number of AWS services are used it becomes complex and unmanaged and access issues are persistent because sometimes even after providing with significant level of access. AWS services won't work till you provide full access to that service which can't be security best practice. Only a limited number of policies ten or so can be attached to a user. Review collected by and hosted on G2.com.
I have 100+ servers. Most of the updates are automatic, but some applications are not. Inspector is great at determining what applications are installed and providing a list of which ones are out of date with regard to security vulnerabilities. Review collected by and hosted on G2.com.
Our only issue is that it's not available when new regions are launched. I understand that it takes time to implement all resources in a new region, but I had hoped that it would be available within 6 months. Review collected by and hosted on G2.com.

AWS has good number of services which are best among all Cloud service providers for me like AWS Transist Gateway to support Hub and Spoke architecture, AWS WAF and Shield for L3,L4 & L7 attacks, AWS IAM, AWS Gurd duty, AWS Inspector etc Review collected by and hosted on G2.com.
AWS Shield advance service needs an improvement to protect from every type of DDoS attacks as it was failed twice to detect DDoS attacks and failed to protect our resources and systems where inaccessible during DDoS attack simulation Review collected by and hosted on G2.com.

IAM used to control authentication and authorization of users to use web resources.It manage permission centrally. Review collected by and hosted on G2.com.
Users have not more troubleshooting support from AWS. Review collected by and hosted on G2.com.

AWS Cloud security is the bedlock of digital trust, offering multi-layered defense that anticipates and neutralizes cyber threats. With unrivaled compliance adherence and dynamic adaptability, it stands as the epitome of safe guarding in the ever-evolving relam of cloud computing. Review collected by and hosted on G2.com.
AWS vloud security only disappointment is its convoluted interface and lacks user-friendly features. Review collected by and hosted on G2.com.

The IAM console is very intuitive and easy to use.
All of the necessary tools are grouped on the screen (users, roles, and permissions).
It is possible to customize the access of each user to great detail, assigning each of them a particular set of roles or a permission group. Review collected by and hosted on G2.com.
It is missing a feature to just disable a user, without losing its history or configuration. Review collected by and hosted on G2.com.

IAM is great service to restrict permissions to users who use my AWS account. Permissions are extremely at granular level which means I can restrict others to limited services and also to limited operations on those services who use my aws account .
Using AWS CLI also we can give permissions to users which is very useful. Review collected by and hosted on G2.com.
As a beginner to AWS I didn't found any disadvantages in AWS IAM. Review collected by and hosted on G2.com.

One notable strength of AWS IAM is its granular access control, allowing precise management of permissions for resources and services. This flexibility ensures a secure and tailored approach to user access within AWS environments. Review collected by and hosted on G2.com.
I find the learning curve for AWS IAM policies and configurations to be steep, especially for beginners. Improved user-friendly interfaces and documentation could enhance the onboarding experience. Review collected by and hosted on G2.com.