What is AWS Service Catalog?
AWS Service Catalog allows IT administrators to create, manage, and distribute catalogs of approved products to end users, who can then access the products they need in a personalized portal. Administrators can control which users have access to each application or AWS resource to enforce compliance with organizational business policies. AWS Service Catalog allows your organization to benefit from increased agility and reduced costs because end users can find and launch only the products they need from a catalog that you control.
AWS Service Catalog is a tool in the Cloud Access Management category of a tech stack.
Who uses AWS Service Catalog?
4 companies reportedly use AWS Service Catalog in their tech stacks, including AppDirect, EatWithAva, and iCarros - Data Science.
8 developers on StackShare have stated that they use AWS Service Catalog.
AWS Service Catalog Integrations
AWS Service Catalog's Features
- Ensure Compliance with Corporate Standards
- Help Employees Quickly Find and Deploy Approved IT Services
- Centrally Manage IT Service Lifecycle
AWS Service Catalog Alternatives & Comparisons
What are some alternatives to AWS Service Catalog?
See all alternatives
AWS Config is a fully managed service that provides you with an AWS resource inventory, configuration history, and configuration change notifications to enable security and governance. With AWS Config you can discover existing AWS resources, export a complete inventory of your AWS resources with all configuration details, and determine how a resource was configured at any point in time. These capabilities enable compliance auditing, security analysis, resource change tracking, and troubleshooting.
AWS Identity and Access Management.
Teleport makes it easy for users to securely access infrastructure and meet the toughest compliance requirements.
It provides enterprise identity governance solutions with on-premises and cloud-based identity management software for the most complex challenges.
It supports a family of privileged identity management, privileged remote access, and vulnerability management products for UNIX, Linux, Windows and Mac OS operating systems.