Overview
Description:
Security threats are real for everyone, while large enterprise companies often have full teams tasked with monitoring this, Evoque Cloud Engineering powered by Evoque Cloud Engineering powered by Foghorn can bring the peace of mind any CIO seeks in the fast and cost effective manner that smaller companies need. Fog360 Security scans and examines your AWS environment from every angle. This 360-degree analysis tool lets you understand from a quantitative perspective what is actually running in your accounts. With Evoque Cloud Engineering powered by Foghorn’s help, a customized solution can be deployed quickly to analyze your AWS infrastructure, gain real-time visibility, and incorporate best practices. Fog360 Security allows customers to realize powerful security improvements around workload partitioning, role-based access, least permission, network security visualization, and overall security posture.
With unauthorized users relentlessly poking the perimeter and the cost of breach, downtime, and reputation loss so high, organizations are eager to harden their infrastructure running on AWS. Fog360 Security is a comprehensive security analysis and visualization service that takes a once complex and manual process and puts it in the hands of Evoque Cloud Engineering powered by Foghorn’s experienced engineers, who can update and automate your analysis.
Inclusions:
The cost of the Fog360 security service is based on your cloud environment’s complexity and number of accounts, instances, buckets and policies in place.
Fog360 starts with a personal review and understanding of your cloud infrastructure layers and environment as a whole and how the current architecture fits with the business needs. From there, we deploy proprietary discovery tools to review and expose potential security weaknesses to finally deliver an analysis that is complete with remediation suggestions.
Deliverables:
- A comprehensive report, detailing you current IaaS layers
- Topology diagrams of VPC’s, subnets, NACLS, route tables, security groups
- Permission diagrams of S3 bucket policies, IAM policies, permission settings
- Summary of findings
- Areas of Risk
- Remediation Recommendations
Cost:
T-Shirt size pricing table available based on number of CSP Accts, VPCS/VNETs, Compute Instances, Storage Buckets, IAM Policies/roles, etc
Sold by | Foghorn |
Categories | |
Fulfillment method | Professional Services |
Pricing Information
This service is priced based on the scope of your request. Please contact seller for pricing details.
Support
Support will be delivered directly via our shared slack channel.
For more information, please email us at info@foghornconsulting.com