An organization without access controls and a structured cloud environment welcomes risk. Following the principal of least privilege (PoLP), the Identity Management & Access Control (IMAC) capability helps teams develop a framework to manage their environments by helping them build and monitor their cloud framework with defined, isolated groups. Use this capability to establish and monitor identity in your environment through fine-grained access control for your users, applications, and devices.
AWS Services
Purpose-built cloud products
Total results: 1
- Alphabetical (A->Z)
Partner Solutions
Software, SaaS, or managed services from AWS Partners
Total results: 1
- Publish Date
-
Orca Cloud Security Platform
Orca Security provides full-stack cloud security visibility for your AWS cloud environment—using one time, read-only integration. The platform detects vulnerabilities, malware, misconfigurations, lateral movement risk, weak and leaked passwords, overly permissive identities and entitlements, as well as breaches. By utilizing data from the assets' run time block storage, Orca is able to provide complete and centralized coverage, without the use of deployed agents.
Guidance
Prescriptive architectural diagrams, sample code, and technical content