Public Cloud Encyclopedia: Security, Identity and Compliance Products

Cloud computing security or, more simply, cloud security refers to a broad set of policies, technologies, applications, and controls utilized to protect virtualized IP, data, applications, services, and the associated infrastructure of cloud computing. (Wikipedia)

Cloud Infrastructure Protection
Basic protection mesures of cloud resources at all levels.
Cloud Data Centers Protection (3)
Security and protection of data is a key design criteria for any cloud data center.
Firewalls (3)
A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
DDoS Protection (3)
A set of techniques or tools for resisting or mitigating the impact of distributed denial-of-service (DDoS) attacks on networks attached to the Internet by protecting the target and relay networks.
Web Application Firewalls (WAF) (3)
Filters, monitors, and blocks HTTP traffic to and from a web application.
Identity & Access Management
A framework of policies and technologies for ensuring that the proper people in an enterprise have the appropriate access to technology resources.
Identity & Access Management (IAM) for Infrastructure (5)
IAM for could resources, usually focused on creating and managing technical users and groups, and use permissions to allow and deny their access to cloud resources.
Identity & Access Management for Apps (3)
IAM services for end-users of mobile and web applications.
Directory Service (4)
A shared information infrastructure for locating, managing, administering and organizing everyday items and network resources, which can include volumes, folders, files, printers, users, groups, devices, telephone numbers and other objects.
Data Protection
Key Management Services (5)
Management of cryptographic keys in a cryptosystem, dealing with the generation, exchange, storage, use, crypto-shredding (destruction) and replacement of keys.
Certificates Managers (3)
Intelligent Data Protection (3)
Encryption Tools (2)
Hardware Security Modules (HSMs) (3)
A physical computing device that safeguards and manages digital keys, performs encryption and decryption functions for digital signatures, strong authentication and other cryptographic functions.
Security Information and Event Management (SIEM)
A subsection within the field of computer security, where software products and services combine security information management (SIM) and security event management (SEM).
Security Hubs (4)
Detection & Analysis Services (6)
  • [AWS] Detective
    Analyze and visualize security data to rapidly get to the root cause of potential security issues.
  • [AWS] Inspector
    Automated security assessment service to help improve the security and compliance of applications deployed on AWS.
  • [AWS] GuardDuty
    Protect your AWS accounts and workloads with intelligent threat detection and continuous monitoring.
  • [Google Cloud] Audit Logs
    Gain visibility into who did what, when, and where for all user activity on Google Cloud Platform.
  • [Google Cloud] Access Transparency
    Expand visibility and control over your cloud provider with near real-time logs and approval controls.
  • [Google Cloud] Event Threat Detection
    Uncover security threats in Google Cloud Platform environments.
Compliance (6)
Efforts to ensure that organizations are aware of and take steps to comply with relevant laws, policies, and regulations.
  • [AWS] GDPR Compliance Center
    All AWS Services are GDPR ready, and AWS offers services and resources to customers to help them comply with GDPR requirements.
  • [AWS] Artifact
    No cost, self-service portal for on-demand access to AWS’ compliance reports.
  • [AWS] Config
    Record and evaluate configurations of your AWS resources.
  • [Azure] GDPR Compliance
    Azure provides mechanisms and guidelines to help customers honor rights and fulfill obligations under the GDPR when using Microsoft products and services.
  • [Google Cloud] GDPR Compliance
    Compliance with the GDPR is a top priority for Google Cloud and our customers.
  • [Google Cloud] Asset Inventory
    A metadata inventory service that allows you to view, monitor, and analyze all your GCP and Anthos assets across projects and services.
User Protection Services (3)
Protecting end-users of mobile or web apps from malicious attacks, such as phishing.
  • [Google Cloud] Phishing Protection
    Protect your users from phishing sites.
  • [Google Cloud] reCAPTCHA Enterprise
    Help protect your website from fraudulent activity, spam, and abuse.
  • [Google Cloud] Web Risk API
    Detect malicious URLs on your website and in client applications.