0% found this document useful (0 votes)
126 views2 pages

AWS Cloud Security Assessment Guide

This document discusses performing an AWS cloud security assessment. It covers assessing security of the AWS environment, security roles and access controls, data collection and storage, security policies and recommendations, identity and access management, ongoing security monitoring, AWS Security Center configurations, and developer operations. The assessment approach considers security of the AWS environment and security in the AWS environment. Deliverables include an assessment report, customized policies and procedures, training, and more.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
126 views2 pages

AWS Cloud Security Assessment Guide

This document discusses performing an AWS cloud security assessment. It covers assessing security of the AWS environment, security roles and access controls, data collection and storage, security policies and recommendations, identity and access management, ongoing security monitoring, AWS Security Center configurations, and developer operations. The assessment approach considers security of the AWS environment and security in the AWS environment. Deliverables include an assessment report, customized policies and procedures, training, and more.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

AWS CLOUD SECURITY ASSESSMENT

Datasheet

Overview Security of the AWS


environment
Amazon Web Services (AWS) provides a suite of infrastruc-
ture services that you can use to deploy your cloud applica-
tions. What would be the impact if your database were
Security Roles & Access Controls
compromised? What consequences would you face if a
malicious outsider gained access to your AWS cloud environ-
ment? How can you be sure there is not a misconfiguration Data Collection & Storage
in the infrastructure? Ensuring AWS cloud security must
begin with an AWS Security Assessment.
Security Policies & Recommendations

Identity & Access Management


What is AWS Cloud Security
Assessment? Ongoing Security Monitoring

AWS Security Center Configurations


AWS cloud security assessment refers to the services,
controls, and features configured for customers of AWS
services for protecting their data, applications, and other Developer Operations (DevOps)
assets. The shared responsibility model varies depending on
whether the data is hosted on Software as a Service (SaaS), Asset Configuration & Management
Platform as a Service (PaaS) or Infrastructure as a Service
(IaaS).
Secure Baseline Assessment / Hardening
This assessment is intended to help enterprises think Change Management
through various operational security considerations (shared Patch Management
responsibility model of cloud hosting) as they deploy Vulnerability Assessment
sophisticated enterprise applications on AWS.

Encryption

Approach & Methodology Security Information & Event Management (SIEM)

The approach taken by Digit Labs for this Security Design Protection against malware / backdoors and trojans
Validation is to consider the following aspects of AWS
Security:
Web Application Firewall
Security of the AWS Environment.
Security in the AWS Environment (Security of hosts Intrusion Detection / Prevention Solution
& Applications)

AWS Secure by Design is about designing security and Data Loss Prevention
compliance capabilities for all phases of security by design-
ing everything within the AWS customer environment.

(021) 3589-2182 [Link] info@[Link]


Identify and Access Security Policies on
Management Virtual Machines

Securely Configured
AWS
Datastore
Storage Accounts

A review of Virtual Machines


Networking
(Endpoint, OS Patches, Disk
Security Groups
Encryption) can also be included

Our Deliverables

AWS Cloud Security Assessment Report Breach Notification Policy

Customized Policies and Procedures Model Contract Templates

Customized Staff Awareness Training Vendor Compliance and Review

Customized Information Security Policy Virtual Data Protection Officer (DPO)

About Di it
Di8it by Digit Labs is a Cyber Security Consultancy specializing in Information Security Services including but not limited
to Offensive, Adversary, Advisory, and Managed Security Services. We believe in tailoring the requirements of our
customers and understand that one solution does not fit all. As Security specialists, we cut through the oddities that can
obstruct the velocity of work & ensure an agile and effective service delivery.

(021) 3589-2182 [Link] info@[Link]

You might also like