You are on page 1of 2

Amazon Web Services (AWS):

1. Identity and Access Management (IAM):


AWS IAM enables you to manage user access to AWS services and resources securely. It allows you to
create and manage users and groups, control access to resources using permissions, and set up multi-
factor authentication (MFA) for enhanced security.
2. AWS Key Management Service (KMS):
KMS helps in creating and managing encryption keys that can be used to encrypt data. It integrates with
various AWS services, allowing you to encrypt data stored in AWS services or applications using KMS-
managed keys.
3. AWS Shield:
AWS Shield is a managed Distributed Denial of Service (DDoS) protection service that safeguards web
applications running on AWS from large-scale attacks. It provides always-on detection and automatic
inline mitigations to minimize application downtime and latency.
4. AWS WAF (Web Application Firewall):
AWS WAF helps protect web applications from common web exploits by filtering and monitoring
HTTP/HTTPS requests to web applications. It allows you to create custom rules to block specific traffic
patterns that could be indicative of attacks.
5. AWS Firewall Manager:
This service centrally manages AWS WAF rules across multiple AWS accounts and resources. It
simplifies the administration of security policies and rules across various applications and resources.
6. AWS Inspector:
AWS Inspector helps improve the security and compliance of applications deployed on AWS by
automatically assessing applications for vulnerabilities, deviations from best practices, and common
security issues.
7. AWS Security Hub:
It provides a comprehensive view of the security state of your AWS environment by aggregating,
organizing, and prioritizing security findings from various AWS services and third-party tools.

Microsoft Azure:
1. Azure Active Directory (Azure AD):
Azure AD is Microsoft's cloud-based identity and access management service. It allows you to manage
user identities and access to various applications and resources across Azure and other Microsoft services.
2. Azure Security Center:
Azure Security Center is a unified security management system that provides threat protection and
security posture management across hybrid cloud workloads. It helps detect and respond to threats while
also providing security recommendations and best practices.
3. Azure Sentinel:
Azure Sentinel is a cloud-native Security Information and Event Management (SIEM) and Security
Orchestration, Automation, and Response (SOAR) solution. It helps collect, analyze, and respond to
security threats across the enterprise.
4. Azure Firewall:
Azure Firewall is a managed, cloud-based network security service that protects Azure Virtual Network
resources. It provides network-level protection and filtering for outbound and inbound traffic.
5. Azure DDoS Protection:
This service safeguards Azure-hosted applications from Distributed Denial of Service (DDoS) attacks by
providing defense mechanisms against volumetric, protocol, and application layer attacks.
6. Azure Key Vault:
Azure Key Vault helps safeguard cryptographic keys and secrets used by cloud applications and services.
It offers secure storage of keys, certificates, and secrets backed by hardware security modules (HSMs).

Google Cloud Platform (GCP):


1. Identity and Access Management (IAM):
GCP IAM manages access control by defining who (identity) has what access (permissions) to which
resources. It enables fine-grained control over access to GCP services and resources.
2. Cloud Identity-Aware Proxy:
This service provides context-aware access controls to applications deployed on GCP. It allows
administrators to define access policies based on user identity and context, securing applications from
unauthorized access.
3. Google Cloud Armor:
Google Cloud Armor is a web application firewall (WAF) service that defends against web-based threats
and Distributed Denial of Service (DDoS) attacks. It helps protect web applications and services hosted
on GCP.
4. Cloud Security Command Center:
This service provides security and data risk insights across GCP. It helps identify and mitigate threats by
offering centralized visibility into asset inventory, vulnerabilities, and security threats.
5. Google Cloud Key Management Service (KMS):
GCP KMS allows customers to manage cryptographic keys for their cloud services. It provides a
centralized key management system for data encryption, decryption, and signing operations.

You might also like