Identity and access management (IAM)

Grant and manage user and entity access to the right resources while continuously monitoring and enforcing IAM policies using third-party tools.

Access to resources on AWS is largely determined based on identity. Protecting these identities requires the implementation of the right set of tools to manage the identities’ lifecycle and their associated entitlements for resource access. Your organization needs to be able to discover and review account access, enforce multi-factor authentication, and quickly provision and revoke access. Furthermore, you must also manage secrets, API keys, and credentials while ensuring that they are properly safeguarded and accessible only by authorized entities. 

Learn how to set up a least privilege stack, including such key issues as where to start and what to prioritize.

Watch webinar 


The solutions available in AWS Marketplace allow you to securely govern and control your IAM needs. This includes managing privileged access, discovering over-privileged accounts, implementing least privilege practices, and provisioning just-in-time access. 

Auth0 Identity Platform provides universal authentication and authorization for web, mobile, IoT, and legacy apps, protecting the identities of all users.

See how it works: Demo |  Datasheet 


Enhance security with Okta: Easily manage user identity and access for your developers and the applications they build.

See how it works: DemoDatasheet 


OneLogin’s Trusted Experience Platform™ is a IAM foundation to manage and secure digital identities for your workforce and customers from the cloud. 

See how it works: Datasheet 

Ping Identity

Ping Identity delivers one-click access for any user, to virtually any application, on any device. Our cloud IDaaS is easy to implement and simple to use.

See how it works: Demo Datasheet 

IBM Security Services
IBM Security Verify can help protect users, APIs, and things across enterprise, consumer, and partner use cases.

See how it works: DemoDatasheet 


Learn about the latest practices, tools, and how to implement effective IAM processes and policies with resources from AWS Marketplace.

View all security resources 

Key benefits of using third-party solutions available in AWS Marketplace

Tap the largest provider community

Extend the benefits of AWS by using capabilities from familiar solution providers you already trust. These providers have proven success securing different stage of cloud adoption, from initial migration through ongoing day to day management.

Reduce risk without losing speed

Quickly procure and deploy solutions that find and address vulnerabilities, detect intrusions, and enable faster response to incidents while minimizing business disruptions.

Integrate easily with AWS

Count on security tools that are designed for AWS interoperability to follow security best practices.