AWS Native Security: specialization highlights
Atos AWS Native Security services uses AWS native security tools for security posture, threat detection and compliance.
Data from these tools is sent to AWS Security Hub, providing a single pane of glass and making the data actionable. Atos further enhances these capabilities by adding Security Operation Center (SOC), reporting and optionally CSIRT, SIEM and Managed Detection and Response (MDR) through Atos AIsaac.
AWS Infrastructure Vulnerability Scanning >
Automatic scan of AWS infrastructure resources for vulnerabilities.
AWS Resource Inventory Visibility >
Continuous scanning and reporting of all AWS resources, and their configuration details.
AWS Security Best Practices Monitoring >
Detect when AWS accounts and the configuration of deployed resources do not align to security best practices.
AWS Compliance Monitoring >
Configuration compliance based on AWS Config tracking the configuration of resources within an AWS account.
Monitor, Triage Security Events >
Threat Detection based on GuardDuty that continuously monitors for malicious activity and unauthorized behaviour.
24/7 Incident Alerting and Response >
Standard reports are generated that include the security status of each AWS account. Atos experts can provide recommendations with regards to type of alarms, metrics, and reports to be generated depending on the organization’s need.
Distributed Denial of Service (DDoS) Mitigation
A system backed by technology and security experts monitoring 24/7 for Distributed Denial of Service (DDoS) attacks against your AWS applications.
Managed Intrusion Prevention System (IPS) >
Protect your environment from known and emerging network threats that seek to exploit known vulnerabilities.
Managed Detection and Response for AWS Endpoints >
A combination of technology and cloud security experts working to continuously detect, investigate, and remove threats from within your AWS endpoints.
Managed Web Application Firewall (WAF) >
A firewall managed service designed to protect web-facing applications and APIs against common exploits.
Atos AWS Native Security: for which use cases?
Your organization is using multiple AWS resources and is concerned about the compliance of its infrastructure in AWS.
Atos experts leverage AWS Config to continuously audit and assess the overall compliance of your AWS resource configurations against your organizations policies and guidelines.
Your organization has multiple applications deployed on AWS but is concerned about security vulnerabilities and following best practice.
Atos experts combine AWS Inspector automated security assessment capabilities to detect vulnerabilities and deviations from best practice with prioritization of findings to improve the security and compliance of applications deployed on AWS.
Your organization has multiple workloads in AWS and is concerned about not being able to see all security events related to them.
Atos experts combine the power of AWS GuardDuty with its continuously behavior monitoring capabilities, with Atos cybersecurity expert analysis of your AWS account and workload event data to detect and alert on relevant findings related to potential security threats.
Your organization is concerned that its identity and access management policies in AWS are not aligning to best practices and the principle of least privilege.
Atos experts leverage AWS IAM Access Analyzer to check resource policies are deployed according to security best practices such as principle of least privileged in order to improve overall security posture.
The cloud security challenge – The Cloud is a key enabler of digital transformation. It is transforming business, organizations and government, enabling new levels of speed, agility and focus.
Do you know where all your sensitive data is today? Discover in this brochure how can a Cloud Access Security Broker (CASB) enhance your cloud security?