
Sold by: TrustOnCloud - US
Deployed on AWS
A threat model of all the attack scenarios encountered when using EC2 Image Builder with an associated library of controls following a risk-based approach.
Overview
A library of all the attack scenarios on EC2 Image Builder, and how to mitigate them following a risk-based approach.
Everyday use cases we see from our customers are:
- Covering the best practices (best security/effort ratio)
- Reviewing the service based on your application(s) and risk tolerance
- Technology / Service onboarding for large enterprises/agencies
- Staying ahead of new threats with continuous updates (Only available with the 12-month option).
- Compliance mapping to demonstrate a risk-based approach and formulate an action plan
You can choose between:
- Threat Model: Full security assessment of the Cloud Service ($4,800 for 1 month): Full threat model with compliance mapping and risk-based controls.
- Threat Model + Continuous security updates ($6,400 for 12 months): Includes ongoing updates, new security insights, and evolving threat coverage to keep your cloud environment secure.
More details are available at our product page
Details
New
Introducing multi-product solutions
You can now purchase comprehensive solutions tailored to use cases and industries.
Features and programs
Financing for AWS Marketplace purchases
AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
Pricing
Pricing is based on the duration and terms of your contract with the vendor. This entitles you to a specified quantity of use for the contract duration. If you choose not to renew or replace your contract before it ends, access to these entitlements will expire.
Additional AWS infrastructure costs may apply. Use the AWS Pricing Calculator to estimate your infrastructure costs.
Dimension | Description | Cost/month |
|---|---|---|
Product Access | Dimension that grants access to the product for subscribers. | $4,800.00 |
Vendor refund policy
Refunds are not offered for this product.
How can we make this page better?
We'd like to hear your feedback and ideas on how to improve this page.
Legal
Vendor terms and conditions
Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .
Content disclaimer
Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.
Delivery details
AWS Data Exchange (ADX)
AWS Data Exchange is a service that helps AWS easily share and manage data entitlements from other organizations at scale.
Additional details
You will receive access to the following data sets.
Data set name | Type | Historical revisions | Future revisions | Sensitive information | Data dictionaries | Data samples |
|---|---|---|---|---|---|---|
aws-imagebuilder | All historical revisions | All future revisions | Not included | Not included |
Resources
Vendor resources
Similar products
Arista Edge Threat Management NG Firewall software is available on AWS to provide comprehensive security and connectivity for a range of advanced, distributed networking scenarios. Connect remote locations and ensure safety, reliability and performance while providing protection for your data, applications and users.
Arista Edge Threat Management NG Firewall software is available on AWS to provide comprehensive security and connectivity for a range of advanced, distributed networking scenarios. Connect remote locations and ensure safety, reliability and performance while providing protection for your data, applications and users.
Advanced threat prevention security for AWS and hybrid cloud environments, with Threat Extraction and Threat Emulation, and with GWLB (starting with R81.20)
**Please note: To ensure optimal operations, Check Point recommends a 4 vCores machine size. This provides balanced efficiency and smooth performance, which most customers find ideal for their needs.
Protect your dynamic cloud environments with consistent security, superior visibility, and advanced threat defense such as application visibility and control, deep packet inspection, IPS, malware defense, and URL filtering - powered by Cisco Talos® Threat Intelligence. Achieve deeper visibility into QUIC and TLS 1.3 traffic without breaking Layer 7 policies.
Zero-day Malware Protection for Your Cloud and Hybrid Workloads