- IP-based access control
- Automatic vulnerability scanning
- Integration with AWS Identity and Access Management (IAM)
- Server-side encryption with customer-managed keys (CMK)