githubEdit

Security

circle-info

This page was generated from content adapted from the AWS Developer Guidearrow-up-right

AWS security audit guidelines

  • Tip You can monitor your usage of IAM as it relates to security best practices by using AWS Security Hubarrow-up-right. Security Hub uses security controls to evaluate resource configurations and security standards to help you comply with various compliance frameworks. For more information about using Security Hub to evaluate IAM resources, see AWS Identity and Access Management controlsarrow-up-right in the AWS Security Hub User Guide.

  • Note We recommend that you use Amazon Cognitoarrow-up-right to manage user identity in your app. This service lets you authenticate users using Login with Amazon, Facebook, Google, or any OpenID Connect (OIDC)–compatible identity provider. For more information, see Amazon Cognito identity poolsarrow-up-right in the Amazon Cognito Developer Guide.

Last updated