AWS Native Security

Managed security services (MSS) for Amazon Web Services

Protect your AWS deployments with managed security services (MSS)

Amazon invests heavily in security for Amazon Web Services (AWS). They secure all AWS data in their own highly secure on-premise data centers and build network firewalls, data in-transit and at-rest encryption, and multiple connectivity options to provide infrastructure security.

However, cloud security is a shared responsibility model: while AWS manages the security of the cloud, security in the cloud is the responsibility of the customer. In this context, misconfigurations are a primary vector for cloud resources to be compromised. Atos AWS Native Security services is built around the native capabilities that AWS brings to its customers to enhance their security.

Download our Building trust hybrid cloud brochure

Cloud security

To follow or contact us:
Linkedin | Twitter

AWS Native Security: specialization highlights

Atos AWS Native Security services uses AWS native security tools for security posture, threat detection and compliance.
Data from these tools is sent to AWS Security Hub, providing a single pane of glass and making the data actionable. Atos further enhances these capabilities by adding Security Operation Center (SOC), reporting and optionally CSIRT, SIEM and Managed Detection and Response (MDR) through Atos AIsaac.

AWS Infrastructure Vulnerability Scanning >

Automatic scan of AWS infrastructure resources for vulnerabilities.

AWS Resource Inventory Visibility >

Continuous scanning and reporting of all AWS resources, and their configuration details.

AWS Security Best Practices Monitoring >

Detect when AWS accounts and the configuration of deployed resources do not align to security best practices.

AWS Compliance Monitoring >

Configuration compliance based on AWS Config tracking the configuration of resources within an AWS account.

Monitor, Triage Security Events >

Threat Detection based on GuardDuty that continuously monitors for malicious activity and unauthorized behaviour.

24/7 Incident Alerting and Response >

Standard reports are generated that include the security status of each AWS account. Atos experts can provide recommendations with regards to type of alarms, metrics, and reports to be generated depending on the organization’s need.

Distributed Denial of Service (DDoS) Mitigation >

A system backed by technology and security experts monitoring 24/7 for Distributed Denial of Service (DDoS) attacks against your AWS applications.

Managed Intrusion Prevention System (IPS) >

Protect your environment from known and emerging network threats that seek to exploit known vulnerabilities.

Managed Detection and Response for AWS Endpoints >

A combination of technology and cloud security experts working to continuously detect, investigate, and remove threats from within your AWS endpoints.

Managed Web Application Firewall (WAF) >

A firewall managed service designed to protect web-facing applications and APIs against common exploits.

Atos AWS Native Security: for which use cases?


Configuration compliance


Situation

Your organization is using multiple AWS resources and is concerned about the compliance of its infrastructure in AWS.

Solution

Atos experts leverage AWS Config to continuously audit and assess the overall compliance of your AWS resource configurations against your organizations policies and guidelines.


Security assessment


Situation

Your organization has multiple applications deployed on AWS but is concerned about security vulnerabilities and following best practice.

Solution

Atos experts combine AWS Inspector automated security assessment capabilities to detect vulnerabilities and deviations from best practice with prioritization of findings to improve the security and compliance of applications deployed on AWS.


Threat detection


Situation

Your organization has multiple workloads in AWS and is concerned about not being able to see all security events related to them.

Solution

Atos experts combine the power of AWS GuardDuty with its continuously behavior monitoring capabilities, with Atos cybersecurity expert analysis of your AWS account and workload event data to detect and alert on relevant findings related to potential security threats.


Excessive privileges


Situation

Your organization is concerned that its identity and access management policies in AWS are not aligning to best practices and the principle of least privilege.

Solution

Atos experts leverage AWS IAM Access Analyzer to check resource policies are deployed according to security best practices such as principle of least privileged in order to improve overall security posture.

Related resources

bluedash

Atos cybersecurity Hybrid cloud

Brochure

Cybersecurity: Building trust in Hybrid Cloud

The cloud security challenge – The Cloud is a key enabler of digital transformation. It is transforming business, organizations and government, enabling new levels of speed, agility and focus.

Atos cybersecurity CASB cloud security

White Paper

CASB: The Cloud Control Point for continuous real time protection

Do you know where all your sensitive data is today? Discover in this brochure how can a Cloud Access Security Broker (CASB) enhance your cloud security?

Interested in our AWS Native Security offer?