5.3 Security Services Deep Dive

Key Takeaways

  • AWS IAM Identity Center (formerly AWS SSO) provides single sign-on access to multiple AWS accounts and business applications.
  • AWS Cognito provides authentication and authorization for web and mobile applications — supports user sign-up/sign-in and federation.
  • AWS Directory Service provides managed Microsoft Active Directory for Windows workloads on AWS.
  • Amazon GuardDuty analyzes CloudTrail, VPC Flow Logs, DNS logs, and EKS audit logs to detect threats using ML.
  • AWS Security Token Service (STS) provides temporary security credentials for IAM roles and federated users.
Last updated: March 2026

Security Services Deep Dive

Identity Services

AWS IAM Identity Center (formerly AWS SSO)

IAM Identity Center provides centralized single sign-on (SSO) access to multiple AWS accounts and business applications.

FeatureDetail
Single Sign-OnOne login for all AWS accounts in your Organization
Built-in DirectoryOr integrate with Active Directory, Okta, Azure AD
Permission SetsDefine permissions once, assign to multiple accounts
Business AppsSSO to Salesforce, Slack, Office 365, and more

Amazon Cognito

Amazon Cognito adds user authentication and authorization to your web and mobile apps.

FeatureDetail
User PoolsUser directory for sign-up/sign-in (username/password, social login)
Identity PoolsProvide temporary AWS credentials for app users to access AWS services
FederationSign in with Google, Facebook, Apple, SAML, OIDC
MFABuilt-in multi-factor authentication support
ScalingScales to millions of users

On the Exam: Cognito = authentication for your APPLICATION users. IAM = access control for your AWS ACCOUNT users. Know the difference.

AWS Directory Service

ServiceDescription
AWS Managed Microsoft ADFull Microsoft Active Directory in the cloud
AD ConnectorProxy to redirect requests to your on-premises AD
Simple ADBasic AD features powered by Samba

Encryption Deep Dive

Encryption at Rest

Protects data stored on disk:

ServiceEncryption Method
S3SSE-S3, SSE-KMS, SSE-C (server-side); client-side encryption
EBSAES-256 encryption using KMS; encrypt on creation
RDSKMS encryption for storage, backups, snapshots, and read replicas
DynamoDBEncryption at rest using AWS-owned, AWS-managed, or customer-managed KMS keys
EFSKMS encryption enabled at file system creation

Encryption in Transit

Protects data moving between systems:

MethodDescription
TLS/SSLHTTPS connections to AWS services and APIs
VPNEncrypted tunnel between on-premises and AWS
AWS Certificate ManagerFree SSL/TLS certificates for AWS services

AWS KMS Key Types

Key TypeDescriptionManagement
AWS Owned KeysAWS owns and manages; shared across accountsNo customer control
AWS Managed KeysCreated by AWS for specific services (aws/s3, aws/rds)View only; automatic rotation
Customer Managed KeysYou create and manage in KMSFull control; manual/automatic rotation

Advanced Security Services

AWS WAF Detailed

WAF Rule Types:

Rule TypeDescription
Managed RulesPre-built by AWS or Marketplace sellers (OWASP Top 10, bot protection)
Custom RulesYou define based on IP, geo, string match, regex, rate-based
Rate-Based RulesAutomatically block IPs that exceed a request rate threshold

Amazon GuardDuty Detailed

Data sources analyzed:

  • CloudTrail Management Events — Unusual API calls, unauthorized deployments
  • CloudTrail S3 Data Events — Suspicious S3 access patterns
  • VPC Flow Logs — Unusual network traffic, port scanning
  • DNS Logs — Communication with known command-and-control servers
  • EKS Audit Logs — Kubernetes cluster threats
  • Lambda Network Activity — Unusual Lambda function behavior

Finding types:

  • Backdoor — Resources compromised and communicating with C&C servers
  • CryptoCurrency — Resources mining cryptocurrency
  • Trojan — Resources communicating with known malicious IPs
  • UnauthorizedAccess — Unusual API calls from suspicious IPs

AWS Network Firewall

A managed stateful network firewall for VPCs with features including:

  • Stateful packet inspection
  • Intrusion prevention system (IPS)
  • Web filtering
  • Custom rules using Suricata-compatible format

Compliance Services Summary

ServicePurpose
AWS ArtifactDownload compliance reports (SOC, PCI, ISO)
AWS Audit ManagerAutomate evidence collection for audits
AWS ConfigEvaluate resource configurations against rules
AWS CloudTrailLog all API activity for auditing
Amazon InspectorScan for software vulnerabilities
Amazon MacieDiscover and protect sensitive data in S3
AWS Security HubCentralized security findings dashboard
Test Your Knowledge

Which AWS service provides authentication and user management for web and mobile applications?

A
B
C
D
Test Your Knowledge

What is the difference between Amazon Cognito and AWS IAM?

A
B
C
D
Test Your Knowledge

Which AWS KMS key type gives you the MOST control over encryption key management?

A
B
C
D
Test Your Knowledge

Which AWS service provides centralized single sign-on (SSO) access across multiple AWS accounts in an Organization?

A
B
C
D