Protecting application software and detecting irregular behavior in your applications are critical in a secure cloud environment. Use the Application Security capability to enforce a fine-grained security policy across your workloads to secure and protect your applications.
AWS Services
Purpose-built cloud products
![](https://d1.awsstatic.com/Gradient-Divider-orange-blue.317b0a6e1db69aa03ede8c5fd6fad7ee117a626f.jpg)
Total results: 1
- Alphabetical (A->Z)
AWS Solutions
Ready-to-deploy solutions assembling AWS Services, code, and configurations
![](https://d1.awsstatic.com/Gradient-Divider-orange-blue.317b0a6e1db69aa03ede8c5fd6fad7ee117a626f.jpg)
Partner Solutions
Software, SaaS, or managed services from AWS Partners
![](https://d1.awsstatic.com/Gradient-Divider-orange-blue.317b0a6e1db69aa03ede8c5fd6fad7ee117a626f.jpg)
Total results: 1
- Publish Date
-
Orca Cloud Security Platform
Orca Security provides full-stack cloud security visibility for your AWS cloud environment—using one time, read-only integration. The platform detects vulnerabilities, malware, misconfigurations, lateral movement risk, weak and leaked passwords, overly permissive identities and entitlements, as well as breaches. By utilizing data from the assets' run time block storage, Orca is able to provide complete and centralized coverage, without the use of deployed agents.
Guidance
Prescriptive architectural diagrams, sample code, and technical content
![](https://d1.awsstatic.com/Gradient-Divider-orange-blue.317b0a6e1db69aa03ede8c5fd6fad7ee117a626f.jpg)