Identity Management & Access Control

An organization without access controls and a structured cloud environment welcomes risk. Following the principal of least privilege (PoLP), the Identity Management & Access Control (IMAC) capability helps teams develop a framework to manage their environments by helping them build and monitor their cloud framework with defined, isolated groups. Use this capability to establish and monitor identity in your environment through fine-grained access control for your users, applications, and devices.

AWS Services

Purpose-built cloud products

Showing results: 1
Total results: 1
  • Alphabetical (A->Z)
1
Back to top 

Partner Solutions

Software, SaaS, or managed services from AWS Partners

Showing results: 1
Total results: 1
  • Publish Date
  • Orca Cloud Security Platform

    Orca Security provides full-stack cloud security visibility for your AWS cloud environment—using one time, read-only integration. The platform detects vulnerabilities, malware, misconfigurations, lateral movement risk, weak and leaked passwords, overly permissive identities and entitlements, as well as breaches. By utilizing data from the assets' run time block storage, Orca is able to provide complete and centralized coverage, without the use of deployed agents.
1
Back to top 

Guidance

Prescriptive architectural diagrams, sample code, and technical content

Showing results: 1
Total results: 1
  • Publish Date
  • Identity Management & Access Control on AWS

    The Guidance for the Identity Management & Access Control (IMAC) capability will help you build and monitor permissions in your environment, structure your organization and organize your resources and develop a framework to manage your environment and provide access to your services.
1