Security in AWS Step Functions
This section provides information about AWS Step Functions security and authentication.
Topics
- Data protection in AWS Step Functions
- Identity and Access Management in AWS Step Functions
- Logging and Monitoring in AWS Step Functions
- Compliance Validation for AWS Step Functions
- Resilience in AWS Step Functions
- Infrastructure Security in AWS Step Functions
- Configuration and Vulnerability Analysis in AWS Step Functions
Step Functions uses IAM to control access to other AWS services and resources. For an overview of how IAM works, see Overview of Access Management in the IAM User Guide. For an overview of security credentials, see AWS Security Credentials in the Amazon Web Services General Reference.