- To protect web applications from common web exploits
- To encrypt data at rest and in transit
- To monitor and record account activity for compliance auditing
- To assess the security state of your AWS resources