What is AWS Service Catalog?
AWS Service Catalog allows IT administrators to create, manage, and distribute catalogs of approved products to end users, who can then access the products they need in a personalized portal. Administrators can control which users have access to each application or AWS resource to enforce compliance with organizational business policies. AWS Service Catalog allows your organization to benefit from increased agility and reduced costs because end users can find and launch only the products they need from a catalog that you control.
AWS Service Catalog is a tool in the Cloud Access Management category of a tech stack.
Who uses AWS Service Catalog?
6 companies reportedly use AWS Service Catalog in their tech stacks, including AppDirect, Echobox.com, and Sami.
10 developers on StackShare have stated that they use AWS Service Catalog.
AWS Service Catalog's Features
- Ensure Compliance with Corporate Standards
- Help Employees Quickly Find and Deploy Approved IT Services
- Centrally Manage IT Service Lifecycle
AWS Service Catalog Alternatives & Comparisons
What are some alternatives to AWS Service Catalog?
See all alternatives
AWS Config is a fully managed service that provides you with an AWS resource inventory, configuration history, and configuration change notifications to enable security and governance. With AWS Config you can discover existing AWS resources, export a complete inventory of your AWS resources with all configuration details, and determine how a resource was configured at any point in time. These capabilities enable compliance auditing, security analysis, resource change tracking, and troubleshooting.
It enables you to manage access to AWS services and resources securely. Using IAM, you can create and manage AWS users and groups, and use permissions to allow and deny their access to AWS resources.
Teleport makes it easy for users to securely access infrastructure and meet the toughest compliance requirements.
Simple and secure remote access — to any system anywhere based on trusted identity. It enables practitioners and operators to securely access dynamic hosts and services with fine-grained authorization without requiring direct network access.
It provides enterprise identity governance solutions with on-premises and cloud-based identity management software for the most complex challenges.