

# Security features outside IAM
<a name="introduction_security-outside-iam"></a>

You use IAM to control access to tasks that are performed using the Amazon Web Services Management Console, the [Amazon Command Line Tools](http://www.amazonaws.cn/tools/#Command_Line_Tools), or service API operations using the [Amazon SDKs](http://www.amazonaws.cn/tools/). Some Amazon products have other ways to secure their resources as well. The following list provides some examples, though it is not exhaustive. 

**Amazon EC2**  
In Amazon Elastic Compute Cloud you log into an instance with a key pair (for Linux instances) or using a user name and password (for Microsoft Windows instances).   
For more information, see the following documentation:   
   
+ [Getting Started with Amazon EC2 Linux Instances](https://docs.amazonaws.cn/AWSEC2/latest/UserGuide/EC2_GetStarted.html) in the *Amazon EC2 User Guide*
+ [Getting Started with Amazon EC2 Windows Instances](https://docs.amazonaws.cn/AWSEC2/latest/WindowsGuide/EC2Win_GetStarted.html) in the *Amazon EC2 User Guide*

**Amazon RDS**  
In Amazon Relational Database Service you log into the database engine with a user name and password that are tied to that database.   
For more information, see [Getting Started with Amazon RDS](https://docs.amazonaws.cn/AmazonRDS/latest/UserGuide/CHAP_GettingStarted.html) in the *Amazon RDS User Guide*. 

**Amazon EC2 and Amazon RDS**  
In Amazon EC2 and Amazon RDS you use security groups to control traffic to an instance or database.   
For more information, see the following documentation:   
   
+ [Amazon EC2 Security Groups for Linux Instances](https://docs.amazonaws.cn/AWSEC2/latest/UserGuide/using-network-security.html) in the *Amazon EC2 User Guide*
+ [Amazon EC2 Security Groups for Windows Instances](https://docs.amazonaws.cn/AWSEC2/latest/WindowsGuide/using-network-security.html) in the *Amazon EC2 User Guide*
+ [Amazon RDS Security Groups](https://docs.amazonaws.cn/AmazonRDS/latest/UserGuide/Overview.RDSSecurityGroups.html) in the *Amazon RDS User Guide*

**WorkSpaces**  
In Amazon WorkSpaces, users sign in to a desktop with a user name and password.   
For more information, see [Getting Started with WorkSpaces](https://docs.amazonaws.cn/workspaces/latest/adminguide/getting_started.html) in the *Amazon WorkSpaces Administration Guide*. 

These access control methods are not part of IAM. IAM lets you control how these Amazon products are administered—creating or terminating an Amazon EC2 instance, setting up new WorkSpaces desktops, and so on. That is, IAM helps you control the tasks that are performed by making requests to Amazon Web Services, and it helps you control access to the Amazon Web Services Management Console. However, IAM does not help you manage security for tasks like signing in to an operating system (Amazon EC2), database (Amazon RDS), or desktop (Amazon WorkSpaces).

When you work with a specific Amazon product, be sure to read the documentation to learn the security options for all the resources that belong to that product. 