Overview of AWS Security Services — Protecting your AWS resources and meeting compliance requirements.


What Are AWS Security Services?

AWS Security Services provide comprehensive security capabilities for your AWS environment — from threat detection and vulnerability scanning to compliance automation and data protection.

Key Insight: Security is a shared responsibility. AWS secures the cloud (infrastructure), you secure what’s IN the cloud (your data, applications, configurations).


The Security Services Landscape

flowchart TB
    subgraph Security["AWS Security Services"]
        direction TB

        subgraph Identity["Identity"]
            direction LR
            IAM["IAM"]
            IIC["IAM Identity Center"]
            Cognito["Cognito"]
        end

        subgraph Network["Network"]
            direction LR
            Shield["Shield"]
            WAF["WAF"]
            NFW["Network Firewall"]
            VPC["VPC Security Controls"]
        end

        subgraph Data["Data"]
            direction LR
            KMS["KMS"]
            HSM["CloudHSM"]
            Macie["Macie"]
        end

        subgraph Threat["Threat Detection"]
            direction LR
            GD["GuardDuty"]
            SH["Security Hub"]
            Inspector["Inspector"]
            Detective["Detective"]
        end

        subgraph Governance["Governance"]
            direction LR
            Config["Config"]
            CT["CloudTrail"]
            AM["Audit Manager"]
            Artifact["Artifact"]
            TA["Trusted Advisor"]
        end
    end

Categories shown: Identity & Access, Network Security, Data Security, Threat Detection & Response, and Compliance & Governance.


Security Services Overview

Identity & Access Management

ServicePurposeKey Capability
IAMCore identity serviceUsers, Groups, Policies, Roles
IAM Identity CenterSingle sign-onMulti-account SSO
CognitoUser authenticationApp user sign-up/sign-in

Network Security

ServicePurposeKey Capability
ShieldDDoS protectionStandard (free) + Advanced (paid)
WAFWeb application firewallHTTP/S traffic filtering
Network FirewallManaged network firewallStateful inspection
VPCNetwork isolationSecurity Groups, NACLs

Data Security

ServicePurposeKey Capability
KMSEncryption key managementCustomer-managed keys
CloudHSMHardware security modulesDedicated HSMs
MacieData discoverySensitive data detection in S3

Threat Detection & Response

ServicePurposeKey Capability
GuardDutyThreat detectionML-powered anomaly detection
Security HubCentralized findingsAggregate security alerts
InspectorVulnerability scanningCompute + container scanning
DetectiveSecurity investigationVisualize attack paths

Compliance & Governance

ServicePurposeKey Capability
ConfigConfiguration trackingCompliance rules, change history
CloudTrailAudit loggingAPI call tracking
Audit ManagerCompliance automationEvidence collection, reports
ArtifactCompliance docsAWS audit reports, agreements
Trusted AdvisorBest practicesCost, security, performance checks

The Security Workflow

flowchart TD
    Ops["Security Operations Lifecycle"]
    P["Prevent<br/>IAM Policies, Security Groups, WAF, KMS"]
    D["Detect<br/>GuardDuty, Config, Macie, Inspector"]
    R["Respond<br/>Security Hub, Detective, EventBridge"]
    C["Comply<br/>Audit Manager, Artifact, Config"]

    Ops --> P
    P --> D --> R --> C
    C -. Continuous improvement .-> P

Security Services Quick Reference

Config — Configuration Tracking

  • What: Monitors and records AWS resource configurations
  • Why: Compliance auditing, change management, security posture
  • Pricing: $0.003 per configuration item (limited free tier for new users)

CloudTrail — Audit Logging

  • What: Logs all AWS API calls
  • Why: Security analysis, compliance, forensics
  • Pricing: Management events free; Data events $0.10 per 100K events

Inspector — Vulnerability Scanning

  • What: Scans EC2, ECR, Lambda for vulnerabilities
  • Why: Find CVEs before they’re exploited
  • Pricing: Per resource; 15-day free trial
  • Important: Inspector Classic ends May 20, 2026

Macie — Data Discovery

  • What: Discovers sensitive data in S3 (PII, PHI, credentials)
  • Why: GDPR/HIPAA compliance, data loss prevention
  • Pricing: Per GB evaluated; 30-day free trial

Artifact — Compliance Documentation

  • What: Repository for AWS compliance documents
  • Why: Provide auditors with AWS certifications
  • Pricing: Free

Audit Manager — Compliance Automation

  • What: Automates evidence collection for compliance
  • Why: Streamline SOC 2, PCI DSS, HIPAA audits
  • Pricing: Available through AWS Support plans

Trusted Advisor — Best Practices

  • What: Recommendations for cost, security, performance
  • Why: Optimize AWS environment
  • Pricing: 7 core checks free; 100+ with Business/Enterprise support

How Security Services Work Together

ScenarioServices Used
Detect unauthorized accessGuardDuty + CloudTrail + Security Hub
Find sensitive data exposureMacie + Config + Security Hub
Prove complianceConfig + CloudTrail + Audit Manager + Artifact
Scan for vulnerabilitiesInspector + ECR + Security Hub
Prevent data breachesIAM + KMS + Macie + WAF

Security Best Practices

PracticeService(s)
Enable MFA on rootIAM
Enable CloudTrailCloudTrail
Enable Config rulesConfig
Scan for vulnerabilitiesInspector
Find sensitive dataMacie
Monitor threatsGuardDuty + Security Hub
Use VPC with private subnetsVPC
Encrypt data at restKMS
Follow Trusted Advisor recommendationsTrusted Advisor

TL;DR

  • Security Services = Comprehensive AWS security capabilities
  • Categories = Identity/Access, Network, Data, Threat Detection, Compliance
  • Config = Configuration tracking ($0.003/item)
  • CloudTrail = API call logging (management events free)
  • Inspector = Vulnerability scanning (15-day trial)
  • Macie = Sensitive data discovery in S3 (30-day trial)
  • Artifact = AWS compliance documents (free)
  • Audit Manager = Compliance automation
  • Trusted Advisor = Best practices (7 free, 100+ paid)
  • Shared Responsibility = AWS secures cloud; you secure what’s in cloud

CategoryServices
Config + CloudTrailConfiguration + Audit
Inspector + MacieVulnerability + Data Discovery
Audit Manager + ArtifactCompliance + Documentation
Trusted AdvisorBest Practices
VPCNetwork Security