Top Rated AWS Cloud Security: Security, Identity and Compliance Alternatives
573 AWS Cloud Security: Security, Identity and Compliance Reviews
Overall Review Sentiment for AWS Cloud Security: Security, Identity and Compliance
Log in to view review sentiment.

Centralised service to manage all of your consol and programmatic access for users, principles and services for RBAC using granular policies. Review collected by and hosted on G2.com.
Cannot think of anything right now. Everything seems to be perfect here. Review collected by and hosted on G2.com.

Earlier we used to get millions of requests on our APIs in few seconds that was not possible from users, it seems like DDOS attack, which was taking lots of CPU and memory, costing us a lot, then we added WAF in cloud front to block bot attacks and detect and block IPs. Review collected by and hosted on G2.com.
Overall it's good, but sometimes we do load testing it also block that IPs, it take that as bot attack. But this is also good but we want to whitelist some IPs that doesn't seems possible here, I guess.. Review collected by and hosted on G2.com.

Reduce operational overhead, optimizes costs.
Improves security and visibility.
Securely share resources with other account.
AWS Resource access manager is a tool in the AWS TOOLS category of a tech stack Review collected by and hosted on G2.com.
I did not found one, possibly because there is not one.
Need more time to understand the software and if o found any bug will update the review after some time Review collected by and hosted on G2.com.

One best thing about AWS WAF is that it allows you to customize requests and responses. For example, when AWS WAF blocks a request, the default response code sent back to the client is HTTP 403 (Forbidden). Review collected by and hosted on G2.com.
One shortcoming of AWS WAF is that it can only protect web applications built on AWS. Additionally, AWS WAF can be difficult to operate daily as it requires high rule-making knowledge. Review collected by and hosted on G2.com.

We had a use case where a random customer will push data to our kinesis stream. Cognito helped us achieve this without much hustle. Review collected by and hosted on G2.com.
Initially we struggled with the documentation. Gradually we get on the track. So yeah, it can be better. Review collected by and hosted on G2.com.

It's very easy to manage ssl and TLS certificates using ACM. Review collected by and hosted on G2.com.
Nothing. Its quite easy to manage all the certificates at one place. Review collected by and hosted on G2.com.
It is helpful as ACM allows to install certificate on all the aws services and as it provides feee ssl/tls certificates. Easily to create and deploy any certificate. Review collected by and hosted on G2.com.
No issues found as if now it works as expected and can be configured easily Review collected by and hosted on G2.com.

It is easy to use and and anyone can setup. One more thing that I like most is scalability. Review collected by and hosted on G2.com.
We can increase token expiration time so that it will be hussle free. Review collected by and hosted on G2.com.

It is as easy as it can get, so easy to setup too.
It is also highly scalable. Review collected by and hosted on G2.com.
If only we can increase the token expiration time to avoid any hassle. Review collected by and hosted on G2.com.
Amazon Cognito incorporates multiple layers of security to protect user data. It supports various authentication methods, including username/password, multifactor authentication (MFA), and integration with external identity providers like Facebook, Google, or SAML-based systems. It also provides features like secure token management, encryption, and advanced security configurations. Review collected by and hosted on G2.com.
The various components, configurations, and options can be overwhelming, requiring a good understanding of the AWS ecosystem. Review collected by and hosted on G2.com.