Overview
Migrating or standing up workloads in the cloud is a powerful way to extend your software stack, but also can introduce new security risks. Kobalt.io is here to help you stay secure. We will provide a detailed report of vulnerabilities and risks in your AWS cloud environment. With this visbility, you can improve your security effectively and confidently.
- Find IAM vulnerabilities - root account use, lax password requirements, lack of multi-factor authentication (MFA)
- Check for logging best practices and ensure event logging is enabled across regions
- Verify that log files are validated and encrypted
- Assess critical account activity like unauthorized API calls and unauthorized access to the management console and root account access
- Drive secure network configurations and limit access to vulnerable ports, enforce “least access” privileges, checking for use of flow logging
- Quickly assess your data bucket settings for data buckets at risk
- Find and fix potentially exposed data buckets configured for external access and identify out of compliance buckets with CIS Benchmark
- Identify vulnerabilities in ephemeral and immutable infrastructure with telemetry to distill and focus on what’s critical/important
- Provide host image scanning for known vulnerabilities before deploying to a live environment
- Connect known CVEs with active packages on hosts for live visibility to active packages with associated vulnerabilities
- Reporting that allows security to “shift right” with tailored reports on new active CVEs and known definitively when a patch has been applied
Sold by | Kobalt.io |
Categories | |
Fulfillment method | Professional Services |
Pricing Information
This service is priced based on the scope of your request. Please contact seller for pricing details.
Support
For assistance, you can reach us at support@kobalthelp.zendesk.com. For more information, please visit us at kobalt.io.