Overview
Description:
Fog360 Security scans and examines a company’s AWS environment from every angle. As the overall connectivity and use of new and emerging technologies increases in the Aerospace & Satellite industry, the threat risk is also on the rise. The need for a partner with the expertise in Gov Cloud and FedRamp, and the knowledge and experience of navigating the complex public sector space in general is more pressing than ever.
This 360-degree analysis service lets you understand from a quantitative perspective what is actually running in your accounts. With Evoque Cloud Engineering powered by Foghorn’s help, a customized solution can be deployed quickly to analyze your AWS infrastructure, gain real-time visibility, and incorporate best practices. Fog360 Security allows AWS Aerospace customers to realize powerful security improvements around workload partitioning, role-based access, least permission, network security visualization, and overall security posture.
With unauthorized users relentlessly poking the perimeter and the cost of breach, downtime, and reputation loss so high, organizations are eager to harden their infrastructure running on AWS. Fog360 Security is a comprehensive security analysis and visualization service that takes a once complex and manual process and puts it in the hands of Evoque Cloud Engineering powered by Foghorn’s experienced engineers, who can update and automate your analysis.
Inclusions:
The cost of the Fog360 security service is based on your cloud environment’s complexity and number of accounts, instances, buckets and policies in place.
Fog360 starts with a personal review and understanding of your cloud infrastructure layers and environment as a whole and how the current architecture fits with the business needs. From there, we deploy proprietary discovery tools to review and expose potential security weaknesses to finally deliver an analysis that is complete with remediation suggestions.
Deliverables:
- A comprehensive report, detailing you current IaaS layers
- Topology diagrams of VPC’s, subnets, NACLS, route tables, security groups
- Permission diagrams of S3 bucket policies, IAM policies, permission settings
- Summary of findings
- Areas of Risk
- Remediation Recommendations
Cost:
T-Shirt size pricing table available based on number of CSP Accts, VPCS/VNETs, Compute Instances, Storage Buckets, IAM Policies/roles, etc
Sold by | Foghorn |
Categories | |
Fulfillment method | Professional Services |
Pricing Information
This service is priced based on the scope of your request. Please contact seller for pricing details.
Support
Support will be delivered directly via our shared slack channel.
For more information, please email us at info@foghornconsulting.com