Cloud security posture management

Secure your cloud assets by finding and fixing configuration flaws and maintain compliance with regulatory requirements with third-party tools.

Security is a shared responsibility between AWS and the customer. While AWS is responsible for “security of the cloud,” customers are responsible for “security in the cloud," or ensuring that AWS services are used securely. Cloud security posture management (CSPM) tools help to enhance your cloud security posture as they perform continuous compliance checks and identify risks associated with workloads being developed.

Learn how to enhance security controls, maintain compliance, and safeguard your data.

Watch webinar 

The solutions available in AWS Marketplace allow you to continuously monitor your usage of AWS products to identify gaps between your desired and actual security postures. If a cloud misconfiguration is detected, CSPMs enable you to quickly remediate risks and bring your environment back into compliance.

By popularity
  • By popularity
  • Product name (A-Z)
  • Product name (Z-A)
No reference found matching the filters you have selected. Please broaden your search by deselecting a filter.


Learn about the latest practices, tools, and how to implement CSPMs with resources from AWS Marketplace.

Learn key considerations for CSPMs and shares tactics that can aid in an investigation.

Watch webinar 

Explore how to improve your security posture through the continuous monitoring and assessment of your AWS environment.

Watch webinar 
View all security resources 

Key benefits of using third-party solutions available in AWS Marketplace

Tap the largest provider community

Extend the benefits of AWS by using capabilities from familiar solution providers you already trust. These providers have proven success securing different stage of cloud adoption, from initial migration through ongoing day to day management.

Reduce risk without losing speed

Quickly procure and deploy solutions that find and address vulnerabilities, detect intrusions, and enable faster response to incidents while minimizing business disruptions.

Integrate easily with AWS

Count on security tools that are designed for AWS interoperability to follow security best practices.