
Sold by: TrustOnCloud - US
Deployed on AWS
A threat model of all the attack scenarios encountered when using AWS IAM with an associated library of controls following a risk-based approach
Overview
A library of all the attack scenarios on AWS IAM, and how to mitigate them following a risk-based approach
Everyday use cases we see from our customers are:
- Covering the “best practices” (best security/effort ratio)
- Reviewing the service depending on your application(s) and implementing the controls based on your risk tolerance
- Technology / Service onboarding for large enterprises/agencies
- Compliance mapping to demonstrate a risk-based approach and formulate an action plan
More details are available at our product page
Details
New
Introducing multi-product solutions
You can now purchase comprehensive solutions tailored to use cases and industries.
Features and programs
Financing for AWS Marketplace purchases
AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
Pricing
Pricing is based on the duration and terms of your contract with the vendor. This entitles you to a specified quantity of use for the contract duration. If you choose not to renew or replace your contract before it ends, access to these entitlements will expire.
Additional AWS infrastructure costs may apply. Use the AWS Pricing Calculator to estimate your infrastructure costs.
Dimension | Description | Cost/month |
|---|---|---|
Product Access | Dimension that grants access to the product for subscribers. | $14,400.00 |
Vendor refund policy
Refunds are not offered on this product.
How can we make this page better?
We'd like to hear your feedback and ideas on how to improve this page.
Legal
Vendor terms and conditions
Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .
Content disclaimer
Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.
Delivery details
AWS Data Exchange (ADX)
AWS Data Exchange is a service that helps AWS easily share and manage data entitlements from other organizations at scale.
Additional details
You will receive access to the following data sets.
Data set name | Type | Historical revisions | Future revisions | Sensitive information | Data dictionaries | Data samples |
|---|---|---|---|---|---|---|
AWS IAM Threat Model | Last 1 revisions | All future revisions | Not included | Not included |
Resources
Vendor resources
Similar products

A threat model of all the attack scenarios encountered when using AWS Identity and Access Management (IAM) with an associated library of controls following a risk-based approach.
Secure your AWS environments with our on-demand Cloud Security Engineers. Specialize in implementing comprehensive AWS security architectures, safeguarding data, and ensuring adherence to industry best practices and regulatory standards.
Professional threat modeling and risk analysis for Amazon Web Services (AWS) that delivers service-specific threat models and actionable security controls to implement in your AWS environment.
Block attacks and secure your entire cloud with SentinelOne Singularity Cloud Security, an AI-powered CNAPP providing deep visibility and robust, real-time protection to defend your AWS environment from initial access to mission target. It unifies proactive exposure management, and real-time protection to safeguard your AWS infrastructure, workloads (VMs, containers), and data with AI-powered detection and automated response. Try Cloud Security for free!