Skip to main content

07. More Services


πŸ›‘οΈ 01. AWS Certificate Manager (ACM)​

AWS Certificate Manager (ACM) provides and manages SSL/TLS certificates to enable HTTPS (in-flight encryption) for AWS resources.

FeatureDescription
PurposeSecure communication between users and apps using HTTPS
Free Public CertsPublic certificates are free and auto-renewed
Private CertsFor internal apps via AWS Private CA
IntegrationWorks with ALB, CloudFront, API Gateway, etc.
ValidationDomain ownership verified via DNS or email
AutomationACM handles provisioning, renewal, and deployment

πŸ”§ How It Works​

  1. Request a certificate in ACM (public or private).
  2. Validate domain ownership.
  3. Attach to AWS resources (e.g., ALB, CloudFront, API Gateway).
  4. ACM auto-renews certificates before expiry.

πŸ’‘ Exam Tip​

If a question mentions HTTPS, SSL/TLS certificate, or in-flight encryption,
the answer is AWS Certificate Manager (ACM).


πŸ” 02. AWS Secrets Manager

AWS Secrets Manager securely stores, retrieves, and automatically rotates secrets like database passwords or API keys.

  • Stores secrets securely (DB creds, API keys, etc.)
  • Auto-rotation using Lambda (e.g., every 30 or 90 days)
  • Integrates with Amazon RDS (MySQL, PostgreSQL, Aurora)
  • Encrypted using AWS KMS
  • Access via SDK, CLI, or Console
  • Paid service – $0.40 per secret/month (+ API costs)

πŸ’‘ Notes​

  • Removes hardcoded credentials in apps
  • For non-sensitive configs, use SSM Parameter Store instead
  • Exam tip β†’ For RDS password rotation, answer is Secrets Manager

πŸ“„ 03. AWS Artifact

AWS Artifact is a portal (not an actual service) that provides on-demand access to AWS compliance reports and agreements.

  • Not a service, but a self-service compliance portal.
  • Provides access to security and compliance documents.
  • Useful for audits and regulatory compliance.

🧩 Two Main Components​

ComponentDescription
Artifact ReportsDownload AWS compliance and security reports (e.g., ISO, PCI, SOC).
Artifact AgreementsReview, accept, and track AWS legal agreements like BAA (Business Associate Addendum) and HIPAA.

πŸ’‘ Use Case​

  • Supports internal audit and compliance reviews.
  • Demonstrates that workloads hosted on AWS meet industry standards.
  • Accessible globally via the AWS Console β†’ Artifact.

πŸ“˜ Remember:
AWS Artifact = Compliance Reports + Agreements portal (ISO, PCI, SOC, HIPAA, BAA).


πŸ›‘οΈ 04. Amazon GuardDuty

Amazon GuardDuty is a threat detection service that continuously monitors your AWS accounts, workloads, and data stored in S3 for malicious activity and unauthorized behavior.

FeatureDescription
Intelligent Threat DetectionUses machine learning, anomaly detection, and integrated threat intelligence to identify potential security risks.
No Setup OverheadEnabled with one click, no agents or software installation required. Includes a 30-day free trial.
Continuous MonitoringContinuously analyzes multiple AWS data sources for suspicious activity.

πŸ“Š Data Sources Analyzed​

CategoryExamples
Core Sources- VPC Flow Logs β†’ Detect unusual IPs or network traffic patterns. - AWS CloudTrail Logs β†’ Identify unusual API calls or unauthorized deployments. - DNS Logs β†’ Detect encoded data exfiltration via DNS queries.
Optional Sources- S3 Data Events (GetObject, DeleteObject, etc.) - EBS Volumes (malware scanning) - RDS/Aurora Login Events - EKS Audit & Runtime Logs - Lambda Network Activity

βš™οΈ Integration & Automation​

ComponentPurpose
Amazon EventBridgeReceives GuardDuty findings as events.
AutomationCreate EventBridge rules to trigger: - Lambda functions (auto-remediation) - SNS notifications (alerts)
Use Cases- Auto-isolate compromised EC2 instances - Notify SecOps teams of suspicious actions
IAM Roles Example

πŸ’° Common GuardDuty Findings​

TypeExample
Credential CompromiseUnusual API activity in CloudTrail
Network ThreatsPort scanning, brute-force attempts
Malware / Crypto AttacksGuardDuty detects cryptocurrency mining indicators
Data ExfiltrationDNS tunneling, unauthorized S3 data access

🧠 Summary​

  • Amazon GuardDuty provides intelligent, continuous threat detection using multiple AWS log sources.
  • Findings are sent to EventBridge β†’ can trigger Lambda or SNS for response automation.
  • Helps protect against unauthorized activity, data theft, and crypto-mining attacks.

🧩 05. Amazon Inspector

Amazon Inspector is an automated vulnerability management service that continuously scans AWS workloads for software vulnerabilities and unintended network exposure.

CapabilityDescription
Automated ScanningContinuously assesses resources without manual intervention.
Agent-Based for EC2Uses AWS Systems Manager (SSM) Agent on EC2 instances to evaluate vulnerabilities and network reachability.
Integrated with ECR & LambdaAutomatically scans container images in Amazon ECR and Lambda functions during deployment.
Continuous UpdatesAutomatically rescans when the CVE database is updated.

βš™οΈ Components & Scope​

Resource TypeWhat It ScansAssessment Criteria
EC2 InstancesOS packages and network configurationKnown vulnerabilities (CVE), unintended network access
ECR Container ImagesPushed Docker imagesSoftware vulnerabilities (CVE database)
Lambda FunctionsFunction code and dependenciesSoftware/package vulnerabilities

🧠 How It Works​

  1. Enable Inspector in the AWS Management Console.
  2. It automatically discovers eligible EC2, ECR, and Lambda resources.
  3. Scans them continuously against:
    • Known CVEs (Common Vulnerabilities and Exposures)
    • Network Reachability (for EC2 only)
  4. Generates findings with risk scores for prioritization.
IAM Roles Example

πŸ“Š Findings & Integrations​

IntegrationPurpose
AWS Security HubCentralized view of all vulnerability findings.
Amazon EventBridgeEvent-driven automation on new findings (e.g., notify via SNS, trigger Lambda).
Risk ScoringAssigns severity levels to vulnerabilities for remediation prioritization.

πŸ’‘ Example Use Cases​

  • Identify outdated OS packages or open ports on EC2 instances.
  • Detect vulnerabilities in container base images before deployment.
  • Scan Lambda functions for insecure dependencies.
  • Automate remediation through EventBridge β†’ Lambda workflows.

🧩 Summary​

  • Amazon Inspector continuously evaluates EC2, ECR, and Lambda for vulnerabilities and exposure.
  • Uses CVE databases and network reachability analysis.
  • Findings flow into Security Hub and EventBridge for visibility and automation.
  • Helps maintain a proactive security posture across AWS workloads.

🧩 06. AWS Config​

AWS Config is a service that helps you audit, record, and evaluate the configurations of your AWS resources over time.

🧭 What AWS Config Does​

FeatureDescription
Configuration RecordingTracks configuration changes of AWS resources (e.g., EC2, S3, IAM).
Compliance AuditingChecks if resources comply with internal or regulatory standards.
Change HistoryMaintains a timeline of configuration changes for each resource.
Data StorageStores configuration snapshots in Amazon S3, which can be analyzed using Athena.
NotificationsSends SNS alerts when resource configurations change.
IntegrationWorks with AWS CloudTrail to show who made API calls.

🧠 Example Questions AWS Config Can Answer​

  • ❓ Is there unrestricted SSH access in my security groups?
  • ❓ Are any of my S3 buckets publicly accessible?
  • ❓ How has my Application Load Balancer configuration changed over time?

🌍 Key Points​

  • AWS Config is a per-region service.
  • You can aggregate configuration data across multiple regions and accounts.
  • You can view resource compliance and configuration history at any time.

πŸ“Š Use Case Example​

TaskAWS Config Feature Used
Track changes to EC2 instancesConfiguration Recorder
Identify non-compliant resourcesConfig Rules
Notify when changes occurSNS Integration
Analyze historical configurationsS3 + Athena

In short:
🧩 AWS Config continuously records resource configurations, checks for compliance, and alerts you about changes β€” helping maintain visibility and governance across your AWS environment.


πŸ” 07. Amazon Macie

Amazon Macie is a fully managed data security and privacy service that uses machine learning (ML) and pattern matching to automatically discover, classify, and protect sensitive data stored in AWS.

IAM Roles Example

🧠 What Macie Does​

FeatureDescription
Data DiscoveryScans and identifies sensitive data (e.g., PII, financial data) in your Amazon S3 buckets.
Machine Learning & Pattern MatchingUses ML models to detect patterns such as credit card numbers, API keys, and personal data.
Automated ClassificationClassifies and labels S3 objects containing sensitive data.
Security AlertsGenerates findings and sends alerts for any exposure or risk detected.
Data VisibilityProvides a centralized dashboard to view where sensitive data is located and how it’s being accessed.

🧩 Common Use Cases​

  • πŸ” Identify PII (Personally Identifiable Information) across S3 buckets.
  • ⚠️ Detect unintended data exposure or publicly accessible sensitive data.
  • 🧾 Support compliance with standards like GDPR, HIPAA, or PCI-DSS.
  • πŸ“Š Monitor data security posture over time.

🌍 Key Points​

  • Fully managed service β€” no need to maintain infrastructure.
  • Analyzes only S3 data at present.
  • Integrates with Amazon EventBridge, AWS Security Hub, and SNS for alerting and automation.
  • Helps maintain data privacy and compliance across your AWS environment.

In short:
πŸ” Amazon Macie uses AI-powered scanning to automatically find, classify, and protect sensitive data like PII in your S3 buckets β€” keeping your AWS environment secure and compliant.


πŸ›‘οΈ 08. AWS Security Hub

AWS Security Hub is a centralized security and compliance service that helps you analyze, manage, and automate security checks across multiple AWS accounts and regions.

IAM Roles Example

🧭 What Security Hub Does​

FeatureDescription
Centralized DashboardProvides a unified view of your AWS security posture and compliance status.
Automated Security ChecksContinuously evaluates your AWS environment against security standards like CIS AWS Foundations and PCI DSS.
Findings AggregationCollects and normalizes alerts (called findings) from multiple AWS services and partner tools.
Multi-Account ManagementSupports AWS Organizations for centralized security visibility across all accounts.
Integration & AutomationIntegrates with AWS services and third-party tools for alerting, remediation, and workflow automation.

🧩 Integrated AWS Services​

Security Hub aggregates findings from:

Source ServicePurpose
AWS ConfigCompliance and configuration tracking (must be enabled first)
Amazon GuardDutyThreat detection and anomaly analysis
Amazon InspectorVulnerability assessment
Amazon MacieSensitive data discovery
IAM Access AnalyzerIdentifies risky permissions
AWS Systems ManagerOperational insights
AWS Firewall ManagerNetwork and firewall compliance
AWS HealthAWS account and resource health events
AWS Partner ToolsSecurity and compliance integrations

βš™οΈ Example Capabilities​

  • πŸ“Š View compliance status in a single dashboard.
  • ⚠️ Detect misconfigurations or vulnerabilities across accounts.
  • πŸ”„ Automate response actions via EventBridge or Lambda.
  • 🧾 Generate consolidated reports for audits and compliance reviews.

🌍 Key Points​

  • Requires AWS Config to be enabled.
  • Aggregates data across multiple accounts and regions.
  • Supports custom insights and automated workflows for remediation.

In short:
πŸ›‘οΈ AWS Security Hub acts as the command center for your cloud security β€” unifying findings from AWS and partner services to give you complete visibility, compliance insights, and automated threat response.


πŸ•΅οΈβ€β™‚οΈ 09. Amazon Detective

Amazon Detective is a security analysis and investigation service that helps you analyze, visualize, and identify the root cause of security issues or suspicious activities across your AWS environment.


🧠 What Amazon Detective Does​

FeatureDescription
Deeper InvestigationHelps you investigate findings from GuardDuty, Macie, and Security Hub to determine the true cause and impact.
Automated Data CollectionContinuously ingests and processes data from VPC Flow Logs, AWS CloudTrail, and Amazon GuardDuty.
Graph-Based AnalysisUses machine learning (ML) and graph models to connect and analyze related events and entities.
Unified ViewCombines events, activities, and relationships across AWS accounts into a single interactive interface.
Visual ContextGenerates visualizations to understand the β€œwho, what, when, and where” behind each incident.

🧩 Example Use Cases​

  • πŸ”Ž Investigate suspicious API calls or unusual user behavior.
  • 🧾 Trace the source of an attack or data exfiltration attempt.
  • 🧠 Identify affected resources and related activities during a breach.
  • βš™οΈ Speed up incident response by providing contextual insights.

🌍 How It Works​

  1. Findings Identified: GuardDuty, Macie, or Security Hub detect a potential issue.
  2. Data Collected: Detective automatically pulls in related logs and metrics.
  3. Graph Analysis: It builds an entity graph linking users, IPs, resources, and actions.
  4. Root Cause Visualization: You can explore interactive visual reports to pinpoint the cause.

βš™οΈ Key Integrations​

Integrated SourceData Type
VPC Flow LogsNetwork traffic patterns
AWS CloudTrailAPI call and user activity history
Amazon GuardDutySecurity findings and threat indicators

In short:
πŸ•΅οΈβ€β™‚οΈ Amazon Detective helps you quickly investigate and visualize security incidents β€” turning raw logs into meaningful insights that reveal the root cause and context behind suspicious activity. `


🚨 10. AWS Abuse

AWS Abuse is the official channel for reporting abusive, malicious, or illegal activities originating from AWS resources or IP addresses.


🧠 Purpose​

AWS provides the Abuse Reporting Service to help individuals or organizations report cases where AWS infrastructure is being misused β€” whether intentionally or unintentionally β€” to perform harmful or prohibited actions.


🚫 Common Types of Abuse​

TypeDescription
SpamReceiving unwanted or unsolicited emails from AWS-owned IPs, or websites hosted on AWS sending spam messages.
Port ScanningAWS resources sending packets to discover open or unsecured network ports.
DoS / DDoS AttacksAWS IPs attempting to flood, crash, or overwhelm your applications or servers.
Intrusion AttemptsUnauthorized login or hacking attempts on your systems.
Hosting Illegal or Copyrighted ContentDistribution of pirated, copyrighted, or objectionable material without consent.
Malware DistributionAWS resources being used to spread malicious software designed to harm computers or networks.

🧩 How to Report Abuse​

If you suspect AWS infrastructure is being used abusively:

Reporting MethodDescription
AWS Abuse FormSubmit an online report through the official AWS Abuse portal.
EmailSend details to πŸ“§ abuse@amazonaws.com including: - Source IP address - Time and date (with timezone) - Nature of the abuse - Relevant logs or evidence

In short:
🚨 AWS Abuse is your go-to channel for reporting any malicious, abusive, or illegal behavior originating from AWS infrastructure β€” helping maintain a secure and trustworthy cloud ecosystem.