
Since, Macie covers s3, cloudwatch covers VPC logs, Cloudtrail with api calls within services. There were some limitations within them. Since our infrastructure may be secure, but in case of defense in depth, we should always consider regular patching of EC2, identify unwanted softwares. Who and when it happened. All these should be logged for correlating purpose. System Manager with help of agents and aggregators shows the posture of an OS or an EC2 or running core. The integration is also very simple with other services to make sure security and compliance is in stand. Coming to patch manager, using playbooks were pretty easy and risk free as it could be triggered based on rules. Thanks for such a service. Implementation and support are always available from docs, whitepapers, community etc, . Review collected by and hosted on G2.com.
Downside is, Overall , in view of compliance sometimes PII uploaded to s3 can be identified with Macie. But when its an image or pdf containing photo copies of such personal sensitive information its hard to identify. It might be stored on the ec2 or s3. But figuring out it is complex. We do have OCR techniques in some services, which can trigger ec2 playbooks. Yes , it can be achievable with right problem solving technique and using the required services. Review collected by and hosted on G2.com.
At G2, we prefer fresh reviews and we like to follow up with reviewers. They may not have updated their review text, but have updated their review.
Validated through LinkedIn
Invitation from G2. This reviewer was not provided any incentive by G2 for completing this review.




