Top Rated AWS Key Management Service (KMS) Alternatives
This service is the enabler for all other services that AWS uses to encrypt your data, eg s3, rds, kinesis and such. I use it for parameter store to encrypt api keys and its really simple and does it job good for that Review collected by and hosted on G2.com.
I dont really have anything that I believe I dislike with the service Review collected by and hosted on G2.com.
35 out of 36 Total Reviews for AWS Key Management Service (KMS)
Overall Review Sentiment for AWS Key Management Service (KMS)
Log in to view review sentiment.

Monitoring is one part which is very essentials eg, VPC flow logs, s3 logs, API logs, system logs with aggregators etc . But analysing the logs as centralized hub , security hub provides the context. Along side coming to compliance , macie with its AI ML models , able to identify PII in S3. More that these, custome logs can also be formatter into ASAF using services like Lamba intervined. Which threat own threat intelligence capablitiy and custom integration to SIEM solution offers visibility across the environment. Apart from service, aws provides a lot of resources for industary standards and that keeps us upto date and skilled. Support is alwasys a second option , as I get everything from easy documented materials. Day to day getting used, gave a clear explames of scenarios where I can act upon a breach or an event with the available service. which helped me to understand the risks and what security controls are needed. Review collected by and hosted on G2.com.
Image recongnikition where photocopies of Sensitive information are elsewhere, not sure where to get the docs. But with few service capablities, was able to do it. Review collected by and hosted on G2.com.

IAM: AWS IAM provides fine-grained control over user permissions and supports multi-factor authentication (MFA), adding an extra layer of security.
Monitoring and threat detection are one of the best. I used services like Amazon GuardDuty and AWS Security Hub in our organization quite often. Review collected by and hosted on G2.com.
Integrating certain third-party security tools may pose challenges due to compatibility issues or the need for additional configuration.
Some users may find the AWS Cloud Security interface a bit confusing and not very user-friendly. Review collected by and hosted on G2.com.

AWS has good number of services which are best among all Cloud service providers for me like AWS Transist Gateway to support Hub and Spoke architecture, AWS WAF and Shield for L3,L4 & L7 attacks, AWS IAM, AWS Gurd duty, AWS Inspector etc Review collected by and hosted on G2.com.
AWS Shield advance service needs an improvement to protect from every type of DDoS attacks as it was failed twice to detect DDoS attacks and failed to protect our resources and systems where inaccessible during DDoS attack simulation Review collected by and hosted on G2.com.

AWS Cloud security is the bedlock of digital trust, offering multi-layered defense that anticipates and neutralizes cyber threats. With unrivaled compliance adherence and dynamic adaptability, it stands as the epitome of safe guarding in the ever-evolving relam of cloud computing. Review collected by and hosted on G2.com.
AWS vloud security only disappointment is its convoluted interface and lacks user-friendly features. Review collected by and hosted on G2.com.
Comprehensive security suite: AWS offers a vast array of security tools and services, covering everything from access management to data encryption and threat detection. This one-stop shop simplifies security implementation and reduces the need for third-party solutions.
Granular control: AWS allows you to fine-tune security settings based on your specific needs and risk tolerance. This level of customization empowers organizations to build a security posture that aligns with their unique environment.
Compliance-focused: AWS provides built-in features and pre-configured compliance frameworks that help organizations meet industry regulations and internal policies. This can significantly streamline compliance audits and reporting processes. Review collected by and hosted on G2.com.
Complexity: The sheer breadth of AWS security offerings can be overwhelming for new users. Navigating the different services and understanding their interactions can be a steep learning curve, even for experienced IT professionals.
Pricing: While AWS offers a free tier for some services, many essential security features come at a cost. The pricing structure can be complex, making it difficult to accurately estimate and budget for security expenses.
Limited visibility: While AWS provides tools for monitoring and analyzing security events, the default dashboards can lack depth and customization options. For organizations with complex security needs, building comprehensive security reports may require additional tools or expertise. Review collected by and hosted on G2.com.

It's a very good service for those who looking for cryptography security for their services. It's very useful management within the aws which provide encryption and description of your data and keep data secure when you send data or save data over the servers. Review collected by and hosted on G2.com.
As of now I don't see many problem with this. Review collected by and hosted on G2.com.
Was very easy to create a key to be able to encrypt/decrypt an rds database. The granularity of security is also good to decide who has access to the key. The built-in key rotation is also a nice feature. Review collected by and hosted on G2.com.
Nothing at the moment. It was very easy to setup for my needs and did not have any problems yet. Review collected by and hosted on G2.com.
The service uptime gives you peace of mind and that is very important for such a critical service like key management. If your whole infrastructure is based in AWS, then KMS is a no brainer but keep in mind that this service will tie you up to it forever. Review collected by and hosted on G2.com.
The somewhat cumbersome API when you don't use the java SDK. I mean, I have used the node.js SDK and it works fine but the API is not very "idiomatic" and looks like a JAVA SDK. Review collected by and hosted on G2.com.
AWS KMS service is one of the best encryption services available on AWS for encryption. AWS KMS is use its own AWS-managed keys for encryption for your data. In my view, it is better than AES -256 based encryption because we do not need to manage any key in KMS. AWS will do on behalf of you. KMS can also be used to encrypt your data in the S3 bucket. In some of the cases, a lot of sensitive data like the details of users can also be encrypted using this. It is a better alternative to cloud HSM. Review collected by and hosted on G2.com.
AWS KMS service pricing depends upon the number of keys generated, in some cases you may need to pay a lot of money. Review collected by and hosted on G2.com.
We have a policy where Bring Your Own Key is required for confidential data in the cloud and AWS has streamlined the process for us. Review collected by and hosted on G2.com.
When we import an encryption key for usage in another account that other account is not able to reference our key by key alias natively. It should be easy enough for AWS to add the ability to reference an encryption key by key alias across accounts. Review collected by and hosted on G2.com.