Categories
AWS – AWS Certified Cloud Practitioner – Day 4 – Understanding AWS Security Services, Governance & Compliance
In Day 4 of my AWS Certified Cloud Practitioner journey, I explored AWS security services, governance, and compliance tools, focusing on when to use services like WAF, Shield, GuardDuty, Inspector, and Trusted Advisor for better decision-making.
Home » Blog » Digital » AWS – AWS Certified Cloud Practitioner – Day 4 – Understanding AWS Security Services, Governance & Compliance

As part of my AWS Certified Cloud Practitioner learning journey, Day 4 focused on AWS security services and governance tools.

The key goal of this session was understanding which security service to use, when, and why — something that is often confusing for beginners.

This post summarizes the core purpose and differences between major AWS security services.


AWS Systems Manager helps you manage, monitor, and automate operations on your EC2 instances and on-prem servers.

  • Patch management
  • Run commands without SSH
  • Configuration management
  • Operational visibility

Use SSM when you want secure operational control over servers without opening ports or managing credentials manually.

👉 Think of SSM as an operations & automation tool, not a firewall.


AWS WAF protects web applications from common attacks like:

  • SQL injection
  • Cross-site scripting (XSS)
  • Malicious bots
  • CloudFront
  • Application Load Balancer
  • API Gateway

Use WAF when your application is public-facing and you need layer 7 (HTTP/HTTPS) protection.


AWS Shield protects against DDoS (Distributed Denial of Service) attacks.

  • Shield Standard – automatic, free, basic protection
  • Shield Advanced – paid, advanced protection with 24/7 AWS support

Use Shield when availability is critical and you want protection against network and transport layer attacks.

👉 WAF protects applications; Shield protects availability.


Amazon Inspector automatically scans workloads for:

  • Security vulnerabilities
  • Exposed software
  • Misconfigurations
  • EC2 instances
  • Container images
  • Lambda functions

Use Inspector when you want continuous vulnerability assessment of your workloads.


Trusted Advisor provides best-practice recommendations across:

  • Security
  • Cost optimization
  • Performance
  • Reliability
  • Service limits

Use Trusted Advisor for high-level guidance and proactive improvement suggestions.

👉 It does not fix issues — it advises.


Amazon GuardDuty is a threat detection service that monitors:

  • CloudTrail logs
  • VPC Flow Logs
  • DNS logs
  • Compromised credentials
  • Malicious IP activity
  • Suspicious behavior

Use GuardDuty for continuous threat monitoring and early detection.


AWS Artifact provides on-demand access to compliance reports, such as:

  • ISO
  • SOC
  • PCI
  • HIPAA

Use Artifact when you need compliance documentation for audits or regulatory requirements.

👉 Artifact provides reports, not protection.


AWS governance focuses on control, visibility, and compliance, using services like:

  • AWS Organizations
  • AWS Control Tower
  • Service Control Policies (SCPs)

Use governance services when managing multiple accounts, enforcing policies, and meeting regulatory requirements.


RequirementUse This Service
Manage EC2 securelySystems Manager
Protect web appsAWS WAF
DDoS protectionAWS Shield
Find vulnerabilitiesAmazon Inspector
Best-practice checksTrusted Advisor
Threat detectionGuardDuty
Compliance reportsAWS Artifact
Multi-account controlGovernance services

AWS security is layered, and each service has a specific role.

Understanding where each service fits is essential for making the right architectural decisions — especially for Cloud Practitioner level.

Home » Blog » Digital » AWS – AWS Certified Cloud Practitioner – Day 4 – Understanding AWS Security Services, Governance & Compliance

2 thoughts on “AWS – AWS Certified Cloud Practitioner – Day 4 – Understanding AWS Security Services, Governance & Compliance

Leave a Reply

Your email address will not be published. Required fields are marked *