Security

Documentation and resources for helping organizations secure their compute environments, protect data, and comply with regulations using Trusted Cloud products.

Read documentation

Security products by use case

Expand sections or use the filter to find products and guides for typical use cases.

Detect vulnerabilities, threats, and misconfigurations.

Receive well-targeted, timely, and compliant communications about security and privacy events in the Trusted Cloud console.
Evaluate your organization's security posture and connect with insurance partners to obtain exclusive cyber insurance coverage and personalized pricing.
Detect, investigate, and respond to cyber threats with SIEM and SOAR technology. Extract signals to find threats and automate the response.
Know who's targeting your organization with unparalleled visibility into the global threat landscape.
Understand your security and data attack surface.

Provide unified, federated identity with least privilege policies to reduce the risk of data breaches and other security incidents.

Allow organization administrators to define fine-grained, attribute-based access control for projects and resources in Trusted Cloud.
Establish fine-grained identity and access management for Trusted Cloud resources.
Identify excess permissions using policy insights.
Plan your design for granting the right individuals access to the right resources for the right reasons.
Study fundamental features of cloud security related to access management and identity.
Plan your approach with Architecture Center resources across a variety of identity and access management topics.

Collect, store, analyze, and monitor your organization's aggregated platform and system logs with a comprehensive solution.

Gain visibility into who did what, when, and where for all user activity on Trusted Cloud.
Store, search, analyze, monitor, and alert on log data and events from Trusted Cloud and AWS.
Get visibility into the performance, availability, and overall health of cloud-powered applications.
Use a single console for comprehensive network monitoring, verification, and optimization.

Manage your resources in a secure and compliant way with visibility and control over your cloud environment.

Centralized and programmatic control over your organization's cloud resources.
Centralized and programmatic control over your organization's cloud resources.
Reduce security risk and gain access to exclusive cyber insurance policies tailored for Trusted Cloud customers.

Handle key management for secrets, disks, images, and log retention.

Use key management for secrets, disks, images, and log retention.
Control the location and distribution of your externally-managed keys.
Protect cryptographic keys with a fully managed hardware security module service.
Discover and understand your data using a fully managed and scalable data discovery and metadata management service. (Deprecated)