Our website uses cookies to give you the most optimal experience online by: measuring our audience, understanding how our webpages are viewed and improving consequently the way our website works, providing you with relevant and personalized marketing content.
You have full control over what you want to activate. You can accept the cookies by clicking on the “Accept all cookies” button or customize your choices by selecting the cookies you want to activate. You can also decline all non-necessary cookies by clicking on the “Decline all cookies” button. Please find more information on our use of cookies and how to withdraw at any time your consent on our privacy policy.

Managing your cookies

Our website uses cookies. You have full control over what you want to activate. You can accept the cookies by clicking on the “Accept all cookies” button or customize your choices by selecting the cookies you want to activate. You can also decline all non-necessary cookies by clicking on the “Decline all cookies” button.

Necessary cookies

These are essential for the user navigation and allow to give access to certain functionalities such as secured zones accesses. Without these cookies, it won’t be possible to provide the service.
Matomo on premise

Marketing cookies

These cookies are used to deliver advertisements more relevant for you, limit the number of times you see an advertisement; help measure the effectiveness of the advertising campaign; and understand people’s behavior after they view an advertisement.
Adobe Privacy policy | Marketo Privacy Policy | MRP Privacy Policy | AccountInsight Privacy Policy | Triblio Privacy Policy

Social media cookies

These cookies are used to measure the effectiveness of social media campaigns.
LinkedIn Policy

Our website uses cookies to give you the most optimal experience online by: measuring our audience, understanding how our webpages are viewed and improving consequently the way our website works, providing you with relevant and personalized marketing content. You can also decline all non-necessary cookies by clicking on the “Decline all cookies” button. Please find more information on our use of cookies and how to withdraw at any time your consent on our privacy policy.

Skip to main content

AWS Native Security

Managed security services (MSS) for Amazon Web Services

Protect your AWS deployments with managed security services (MSS)

Amazon invests heavily in security for Amazon Web Services (AWS). They secure all AWS data in their own highly secure on-premise data centers and build network firewalls, data in-transit and at-rest encryption, and multiple connectivity options to provide infrastructure security.

However, cloud security is a shared responsibility model: while AWS manages the security of the cloud, security in the cloud is the responsibility of the customer. In this context, misconfigurations are a primary vector for cloud resources to be compromised. Eviden AWS Native Security services is built around the native capabilities that AWS brings to its customers to enhance their security.

Download our AWS Native Security brochure

Cloud security

To follow or contact us:
Linkedin | Twitter

AWS Native Security: specialization highlights

Eviden AWS Native Security services uses AWS native security tools for security posture, threat detection and compliance.
Data from these tools is sent to AWS Security Hub, providing a single pane of glass and making the data actionable. Eviden an atos business further enhances these capabilities by adding Security Operation Center (SOC), reporting and optionally CSIRT, SIEM and Managed Detection and Response (MDR) through Eviden AIsaac.

AWS Infrastructure Vulnerability Scanning >

Automatic scan of AWS infrastructure resources for vulnerabilities.

AWS Resource Inventory Visibility >

Continuous scanning and reporting of all AWS resources, and their configuration details.

AWS Security Best Practices Monitoring >

Detect when AWS accounts and the configuration of deployed resources do not align to security best practices.

AWS Compliance Monitoring >

Configuration compliance based on AWS Config tracking the configuration of resources within an AWS account.

Monitor, Triage Security Events >

Threat Detection based on GuardDuty that continuously monitors for malicious activity and unauthorized behaviour.

24/7 Incident Alerting and Response >

Standard reports are generated that include the security status of each AWS account. Atos experts can provide recommendations with regards to type of alarms, metrics, and reports to be generated depending on the organization’s need.

Distributed Denial of Service (DDoS) Mitigation

A system backed by technology and security experts monitoring 24/7 for Distributed Denial of Service (DDoS) attacks against your AWS applications.

Managed Intrusion Prevention System (IPS) >

Protect your environment from known and emerging network threats that seek to exploit known vulnerabilities.

Managed Detection and Response for AWS Endpoints >

A combination of technology and cloud security experts working to continuously detect, investigate, and remove threats from within your AWS endpoints.

Managed Web Application Firewall (WAF) >

A firewall managed service designed to protect web-facing applications and APIs against common exploits.

Eviden AWS Native Security: for which use cases?

O_cloud hybrid_yellow
Configuration compliance


Situation

Your organization is using multiple AWS resources and is concerned about the compliance of its infrastructure in AWS.

Solution

Eviden experts leverage AWS Config to continuously audit and assess the overall compliance of your AWS resource configurations against your organizations policies and guidelines.


Security assessment


Situation

Your organization has multiple applications deployed on AWS but is concerned about security vulnerabilities and following best practice.

Solution

Eviden experts combine AWS Inspector automated security assessment capabilities to detect vulnerabilities and deviations from best practice with prioritization of findings to improve the security and compliance of applications deployed on AWS.


Threat detection


Situation

Your organization has multiple workloads in AWS and is concerned about not being able to see all security events related to them.

Solution

Eviden experts combine the power of AWS GuardDuty with its continuously behavior monitoring capabilities, with Eviden cybersecurity expert analysis of your AWS account and workload event data to detect and alert on relevant findings related to potential security threats.


Excessive privileges


Situation

Your organization is concerned that its identity and access management policies in AWS are not aligning to best practices and the principle of least privilege.

Solution

Eviden experts leverage AWS IAM Access Analyzer to check resource policies are deployed according to security best practices such as principle of least privileged in order to improve overall security posture.

Related resources

Atos cybersecurity AWS Native security brochure

Brochure

AWS Native Security

Protect your AWS deployments with managed security services.

Atos cybersecurity Hybrid cloud

Brochure

Cybersecurity: Building trust in Hybrid Cloud

The cloud security challenge – The Cloud is a key enabler of digital transformation. It is transforming business, organizations and government, enabling new levels of speed, agility and focus.

Interested in our AWS Native Security offer?