Listing Thumbnail

    CyberCX Security Configuration Review (STA)

     Info
    Sold by: CyberCX 
    Securing your cloud tenancies, systems, applications, and information workloads
    Listing Thumbnail

    CyberCX Security Configuration Review (STA)

     Info
    Sold by: CyberCX 

    Overview

    Cloud security

    Cloud security denotes a collection of guidelines, technologies, and controls put into place to assist in shielding the combined elements that make up cloud computing. These include data, applications, and the infrastructure itself. While cloud services are being embraced by business, the rules about security are not always clear. Service providers often believe that the customer is responsible for implementing security prior to deploying the solution. Customers may believe that security is an included and integral part of the cloud solution they are purchasing; however, this may not be the case. When data and services are managed by a third party, cloud solutions present a unique security and governance challenge.

    Amazon Web Services

    CyberCX can perform a detailed review of the static configuration and ‘hardening’ characteristics of your AWS tenancies, instances, VPCs, and services. These assessments will be performed using automated and manual testing in consultation with our detailed assessment methodology, requiring only read-only access to evaluate the implemented configuration against industry best practice. CyberCX will review implemented products, benchmark their settings against industry best practice, and make detailed recommendations for improvement. Some of the key areas include Active Directory, Identity and Access Management, Infrastructure Protection, Data Protection, Detective Controls, and Incident Response. In addition, we have the skills to assess other cloud assets including all major network virtualised devices, operating systems, and applications.

    Comprehensive Methodology

    Analyse – Gain understanding of infrastructure purpose and use cases. Gap Analysis – Establish preliminary and final gap analysis based on industry security best practices. Authentication / Encryption – Review the platform’s authentication and encryption mechanisms in use and advise on any security implications. Configuration – Review the configurations of the platform’s specific security features, such Cognito, and Resource Access Manager for AWS. Architecture – assess practices in use with respect to security, performance, resilience, and efficiency to develop and maintain cloud solutions. Logging and Monitoring – Review the adequacy of the logging and monitoring configuration and report on any security implications this may have. Platform – Review and ensure the appropriate use of Platform as a Service (PaaS), Infrastructure as a Service (IaaS) services, and Infrastructure as Code (IaC) and features. Recommendations – Recommendations for improvements to the security infrastructure design through components and features benchmarked against industry best practices. Make recommendations on services and features that are absent in the implementation.

    Highlights

    • Gain a comprehensive understanding of your security posture, including actionable recommendations for improvement

    Details

    Sold by

    Delivery method

    Pricing

    Custom pricing options

    Pricing is based on your specific requirements and eligibility. To get a custom quote for your needs, request a private offer.

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Support

    Vendor support

    The CyberCX Support Service provides 24/7 assistance from our team of skilled support consultants. Contact us on:

    NZ Phone: +64 800 436 273

    AU Phone: +61 1300 031 274

    Email: leads@cybercx.com.au 

    https://cybercx.com.au/solutions/security-testing-and-assurance/