An organization without access controls and a structured cloud environment welcomes risk. Following the principal of least privilege (PoLP), the Identity Management & Access Control (IMAC) capability helps teams develop a framework to manage their environments by helping them build and monitor their cloud framework with defined, isolated groups. Use this capability to establish and monitor identity in your environment through fine-grained access control for your users, applications, and devices.
AWS Services
Purpose-built cloud products
![](https://d1.awsstatic.com/Gradient-Divider-orange-blue.317b0a6e1db69aa03ede8c5fd6fad7ee117a626f.jpg)
Total results: 1
- Alphabetical (A->Z)
Partner Solutions
Software, SaaS, or managed services from AWS Partners
![](https://d1.awsstatic.com/Gradient-Divider-orange-blue.317b0a6e1db69aa03ede8c5fd6fad7ee117a626f.jpg)
Total results: 1
- Publish Date
-
Orca Cloud Security Platform
Orca Security provides full-stack cloud security visibility for your AWS cloud environment—using one time, read-only integration. The platform detects vulnerabilities, malware, misconfigurations, lateral movement risk, weak and leaked passwords, overly permissive identities and entitlements, as well as breaches. By utilizing data from the assets' run time block storage, Orca is able to provide complete and centralized coverage, without the use of deployed agents.
Guidance
Prescriptive architectural diagrams, sample code, and technical content
![](https://d1.awsstatic.com/Gradient-Divider-orange-blue.317b0a6e1db69aa03ede8c5fd6fad7ee117a626f.jpg)
Total results: 1
- Publish Date
-
Identity Management & Access Control on AWS
The Guidance for the Identity Management & Access Control (IMAC) capability will help you build and monitor permissions in your environment, structure your organization and organize your resources and develop a framework to manage your environment and provide access to your services.