
As digital identity, artificial intelligence (AI) agents, Web3, and cybersecurity technologies converge, a new paradigm for digital trust is emerging, one in which security, transparency, and innovation reinforce one another. This blog post explores how leading organizations are navigating that convergence, highlighting 1) recent advancements in Web3-based security, 2) real-world AWS use cases that show how organizations can harness Web3 solutions to keep ahead of security threats, and 3) providing some forward-looking strategies to help achieve a quantum-safe future. As these technologies come together, the emphasis will shift to agentic architectures, in which autonomous AI agents collaborate, make decisions, and perform tasks across distributed systems, setting the stage for unprecedented levels of automation and digital trust.
Modern digital identity solutions are rapidly evolving. Traditional, centralized identity and access management (IAM) systems are being enhanced by Web3-based decentralized identifiers (DIDs). These unique, globally verifiable identifiers serve as portable credentials that give individuals and organizations control over their digital identities without reliance on centralized authorities. The shift facilitates persistent, context-aware trust across platforms while preserving data portability and user sovereignty — helping to realize the principle that users should have full ownership and control over their digital identity and data. Platforms like AWS Identity and Access Management, a service for securely managing identities and access to AWS services and resources, are being combined with Web3-based frameworks to help facilitate secure, scalable management of human identities, AI agents, and digital assets. That integration helps support customer compliance with stringent know your customer (KYC) and anti-money laundering (AML) regulations, which are important in facilitating commercial interactions in finance, automotive, healthcare, and other regulated sectors.
The rise of Web3 wallets as digital-identity hubs also marks a paradigm shift from traditional methods of storing and verifying identity through centralized institutions to a decentralized model where individuals have agency and control of personal data and authentication. These wallets empower users to store and manage access not only to digital assets, but also verifiable credentials and DIDs. Advanced custody solutions now offer a spectrum of access levels, from fully self-custodial approaches to hybrid models with institutional recovery mechanisms, helping balance security with user experience. Standardized protocols allow users to carry verified credentials and reputations across platforms, giving individuals and institutions granular control over data sharing. Smart contracts, which consist of codified business logic, can automate credential verification and access rights on digital wallets, supporting privacy-preserving compliance. The result is a user-centric identity ecosystem that balances security, convenience, and privacy.
Use Case 1: TRM, AWS, and the future of Web3 security
A major trend transforming financial services is the rise of digital asset tokenization, in which traditional financial assets are converted into digital tokens on blockchains or distributed ledger platforms. Stablecoins represent a specific type of tokenized asset designed to maintain a stable value by being pegged to fiat currencies like the US dollar, although more complex examples include tokenized ETFs or Treasury Bill funds. Tokenization of digital assets facilitates the direct, programmable ownership and transfer of assets, reducing reliance on intermediaries, streamlining settlement, and unlocking new efficiencies. The tokenized assets market is undergoing remarkable transformation, with projections indicating growth from $2.06 trillion in 2024 to approximately $16 trillion by 2030, according to Boston Consulting Group analysis. Leading institutions like Goldman Sachs, J. P. Morgan, and the European Investment Bank are already issuing digital instruments on public Distributed Ledger Technologies (DLTs). As financial institutions look to modernize and innovate, blockchain and tokenization solutions on AWS are helping redefine asset management, settlement, and digital trust for the next era of finance.
AWS supports customers building DLTs and digital asset workloads by providing technical guidance on architecture best practices, business logic patterns and AWS infrastructure recommendations for blockchain nodes, data indexing, asset tokenization, and more. AWS Web3 specialists also work closely with industry partners to curate partner solutions that help address key customer use cases and can be utilized alongside net-new or existing AWS architectures.
As AI capabilities expand, criminals are able to employ increasingly sophisticated AI tools to automate hacks, orchestrate complex fraud schemes, and evade detection. Security teams are working to counter these efforts by implementing new detection and prevention strategies, removing traditional human bottlenecks and creating new challenges for compliance and security teams. At the forefront of these efforts is AWS partner TRM Labs (TRM), which provides Web3 and blockchain intelligence solutions that support anti‑fraud, AML, and risk detection. TRM is using AWS to develop AI-powered solutions to help safeguard decentralized ecosystems.
TRM has pioneered blockchain investigations with its Behavioral Intelligence platform, which combines AI-driven pattern recognition (Signatures) and contextual transaction analysis (Transfer Labels). These tools help empower investigators to quickly identify and visualize sophisticated money laundering techniques, fraud, and other typologies that might otherwise go unnoticed. Transfer Labels enrich the context of on-chain transactions, helping reveal not just the flow of funds but also intent, such as contract creation, ransom payments, or theft, making blockchain data more actionable for compliance teams and law enforcement.
TRM’s Wallet Screening solution uses AI-powered intelligence to continuously detect emerging scams in near real time. This empowers financial institutions and exchanges to proactively block fraudulent transfers before funds leave customer accounts, provide early warnings to users, and reduce institutional liability from authorized push payment (APP) fraud. The system is supported by nearly million firsthand victim reports from TRM’s Chainabuse platform and is continuously updated by expert human analysts and AI‑driven insights.
transactions in near real time, prioritize risks, and generate actionable alerts. Institutions can train adaptive AI models to recognize evolving scam and fraud techniques, including deepfake content and synthetic media threats, facilitating rapid responses to new attack vectors.
AWS provides the secure, scalable infrastructure that helps power TRM’s AI analytics and blockchain intelligence. By using advanced AI and machine-learning capabilities provided by AWS, TRM can process vast amounts of blockchain data, deliver near real-time insights, and adapt with the rapidly evolving landscape of AI-facilitated crime. Customers using the quantum-safe roadmap developed by AWS benefit from a further enhanced security posture, helping protect sensitive blockchain data and AI models against both current and future quantum threats.
The collaboration between TRM and AWS demonstrates how AI is both a new vector for risk and a critical line of defense. By combining advanced AI-driven analytics, near real-time monitoring, and quantum-safe infrastructure, organizations can stay ahead of the adversaries that are weaponizing AI. An intelligence-led approach is essential because both the scale and sophistication of digital threats continue to grow, and financial institutions, regulators, and law enforcement all need to protect the integrity of the digital-asset ecosystem.
Use Case 2: Manifest’s AI Bill of Materials in automotive manufacturing
As vehicles become increasingly software-defined and connected, the automotive industry faces mounting challenges in managing software and AI supply chain risks, especially with regulations like UNECE R155 now in effect and related standards such as ISO/SAE 21434. The AI Bill of Materials (AIBOM) by Manifest provides a robust solution for automotive manufacturers and suppliers to help address these challenges. Manifest’s AIBOM uses several AWS services to help deliver transparency and security for automotive manufacturers, suppliers and businesses across the AI supply chain. To store datasets and manifest files, Manifest uses Amazon Simple Storage Service (Amazon S3), which provides object storage built to retrieve any amount of data from anywhere. Manifest also uses Amazon SageMaker, AWS’s AI lifecycle and AI model training tool, to build, train and deploy machine learning (ML) models at scale. Manifest’s AI solution uses Amazon Inspector, which provides automated and continual vulnerability management at scale, for exporting and analyzing software bills of materials (SBOMs) and related vulnerability data. These integrations help automotive and manufacturing suppliers and business organizations maintain an updated inventory of models, datasets, dependencies, and deployment locations, as well as respond more quickly to incidents and enforce policies around trusted AI components.
Automotive original equipment manufacturers (OEMs) and tier-one suppliers use the Manifest Platform to maintain a near real-time inventory of AI models and datasets deployed across vehicle platforms and production lines. This includes tracking dependencies, managing custom model development libraries, and documenting where each AI component is used within the broader vehicle ecosystem.
If a vulnerability or poisoned dataset is discovered in a machine learning model used for autonomous driving or advanced driver-assistance systems (ADAS), the Manifest Platform enables automotive cybersecurity and product security teams to quickly identify the affected vehicles or systems. This visibility allows OEMs and their tier-one suppliers to isolate and remediate impacted models or components before safety incidents or large-scale recalls occur.
The Manifest Platform helps automotive manufacturers and suppliers streamline their compliance efforts with global automotive cybersecurity regulations such as UNECE WP.29 R155/R156, ISO/SAE 21434, and ISO 24089. By automating the creation and maintenance of AIBOMs, organizations can demonstrate due diligence in tracking and securing AI components, supporting both regulatory audits and internal risk governance processes.
Automotive third-party risk and compliance teams use the Manifest Platform to enforce organizational policies for evaluating and approving AI models and datasets before integration into production systems. This process strengthens the vetting of third-party and open-source AI components, helping prevent the introduction of vulnerabilities or unverified models into vehicle software ecosystems.
After vehicles are deployed, OEMs and suppliers can use the AIBOM to continuously monitor for newly disclosed vulnerabilities or license risks across both proprietary and supplier-provided AI software. This ongoing vigilance helps reduce the cost and scope of post-production recalls while supporting the long-term safety, reliability, and commercial viability of vehicles in operation.
Use Case 3: Post-Quantum Security for Autonomous Systems. Immutable Audit Trails, Verifiable Data & Identity, and Model Traceability
As the automotive and autonomous systems — self-operating systems or networks capable of performing tasks and making decisions independently. accelerate toward software-defined, connected, and AI-powered platforms, the need for quantum-safe security and robust digital trust is paramount. AWS is at the forefront of this transformation, providing a comprehensive, phased migration to post-quantum cryptography (PQC) that spans the entire cloud environment. This includes protecting vehicle-to-everything (V2X) communication, securing over-the-air updates, and safeguarding AI model deployments. Through scalable implementation pathways and hybrid cryptographic solutions, AWS enables manufacturers to future-proof their security measures while maintaining compliance with emerging standards, ensuring that autonomous and connected vehicles remain secure in both the present and quantum computing future.
AWS’s PQC migration plan is already being realized: ML-KEM-based hybrid post-quantum key agreement is now supported in AWS KMS, ACM, and Secrets Manager, and will roll out to all AWS HTTPS endpoints in the coming years. This allows automotive platforms to adopt quantum-safe cryptography for both data in transit and long-lived digital signatures, with the goal of developing resilient security postures.
Trust is the foundation of every digital relationship. As digital identity, AI, quantum computing, and decentralized technologies converge, the stakes for safeguarding trust have never been higher. The rise of quantum computing presents both transformative opportunities and existential risks demanding that organizations not only prepare for today’s threats but also anticipate those of tomorrow. The convergence of these technologies is accelerating the need for secure-by-design systems, while regulatory frameworks and global standards are catching up to ensure innovation does not outpace security. Proactive adoption of post-quantum cryptography, robust risk management, and cross-industry collaboration are becoming strategic imperatives. By acting now, investing in resilient cryptographic foundations, and fostering a culture of continuous improvement, organizations can ensure that digital trust endures, helping enable the safe evolution of AI, Web3, and the global digital economy in the quantum era.
Read more on Amazon Web Services, Inc.

