
Overview
StrongDM is a Dynamic Access Management platform that centralizes privileged access for all technical users to all critical infrastructure. Administrators gain precise controls, eliminating unauthorized and excessive access permissions. IT, Security, DevOps, and Compliance teams can easily answer who did what, where, and when with comprehensive audit logs. End users enjoy fast, intuitive, and auditable access to the resources they need. It seamlessly and securely integrates with every environment and protocol your team needs.
For custom orders please contact AWS-Marketplace@strongdm.com .
Highlights
- StrongDM centralizes access control with authentication, authorization, networking, and observability in a single platform.
- Least privilege access by default ensures just-right permissions every time.
- Seamlessly and securely integrate with every database, environment, protocol and tool your team needs.
Details
Features and programs
Financing for AWS Marketplace purchases
Pricing
Dimension | Description | Cost/12 months |
---|---|---|
StrongDM Essentials | Includes access to everything: DBs, servers, clusters, and web apps. | $840.00 |
StrongDM Enterprise | Essentials plus enterprise features for mature tech stacks. | $1,200.00 |
The following dimensions are not included in the contract terms, which will be charged based on your usage.
Dimension | Cost/unit |
---|---|
Additional StrongDM User | $840.00 |
Additional StrongDM Enterprise User | $100.00 |
Vendor refund policy
For refund policy, visit www.strongdm.com/tos-client
How can we make this page better?
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
Software as a Service (SaaS)
SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.
Resources
Support
Vendor support
If you encounter any issues with StrongDM, you can refer to our documentation or contact the team. Email us at support@strongdm.com or find documentation at
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.
Similar products



Customer reviews
It was pretty easy to navigate.
App review
StrongDM Review
StrongDM provides a unified gateway for managing access to infrastructure, simplifying the handling of permissions across multiple systems.
Auditability & Session Logging
Every session (SSH, RDP, Kubernetes, database, etc.) is logged and auditable, which helps with compliance (SOC 2, HIPAA, etc.) and troubleshooting.
Granular Role-Based Access Control (RBAC)
Fine-grained RBAC makes it easier to enforce least-privilege policies and control access based on user roles, time-based rules, or resource sensitivity.
No Credential Sharing
End users don’t need to know or store passwords, keys, or connection strings. StrongDM handles credentials securely, reducing the risk of leaks.
Seamless Integration with Existing Identity Providers
It integrates well with Okta, Azure AD, Google Workspace, and other IdPs, making onboarding and offboarding automated and secure.
Once integrated deeply into your access workflows, migrating away from StrongDM can be complex and costly due to proprietary tooling and workflows.
Limited Community and Open Source Tools
Compared to alternatives like HashiCorp Boundary or Teleport, StrongDM lacks a strong open-source ecosystem and community involvement.
Performance Overhead
Because StrongDM acts as a proxy/gateway for all traffic, some users report slight latency or bottlenecks under high loads or specific network configurations.
Auditing: Every session and command is logged across SSH, RDP, Kubernetes, and databases, giving us detailed audit trails for compliance (e.g. SOC 2, HIPAA) and security reviews.
Just-In-Time Access: We can grant time-bound, least-privilege access to sensitive systems, reducing standing permissions and limiting insider risk.
Access Monitoring: Real-time visibility into who accessed what, when, and how — this improves operational oversight and incident response.
These features significantly reduce our operational burden and improve our security posture without slowing down engineering workflows.