Security

Documentation and resources for helping organizations secure their compute environments, protect data, and comply with regulations using Cloud de Confiance products.

Security products by use case

Expand sections or use the filter to find products and guides for typical use cases.

Provide unified, federated identity with least privilege policies to reduce the risk of data breaches and other security incidents.

Allow organization administrators to define fine-grained, attribute-based access control for projects and resources in Cloud de Confiance.
Establish fine-grained identity and access management for Cloud de Confiance resources.

Collect, store, analyze, and monitor your organization's aggregated platform and system logs with a comprehensive solution.

Gain visibility into who did what, when, and where for all user activity on Cloud de Confiance.
Store, search, analyze, monitor, and alert on log data and events from Cloud de Confiance and AWS.
Get visibility into the performance, availability, and overall health of cloud-powered applications.

Manage your resources in a secure and compliant way with visibility and control over your cloud environment.

Centralized and programmatic control over your organization's cloud resources.
Centralized and programmatic control over your organization's cloud resources.
Reduce security risk and gain access to exclusive cyber insurance policies tailored for Cloud de Confiance customers.

Handle key management for secrets, disks, images, and log retention.

Use key management for secrets, disks, images, and log retention.
Control the location and distribution of your externally-managed keys.