Protect your AWS deployments with managed security services (MSS)
Amazon invests heavily in security for Amazon Web Services (AWS). They secure all AWS data in their own highly secure on-premise data centers and build network firewalls, data in-transit and at-rest encryption, and multiple connectivity options to provide infrastructure security.
However, cloud security is a shared responsibility model: while AWS manages the security of the cloud, security in the cloud is the responsibility of the customer. In this context, misconfigurations are a primary vector for cloud resources to be compromised. Eviden AWS Native Security services is built around the native capabilities that AWS brings to its customers to enhance their security.
To follow or contact us:
AWS Native Security: specialization highlights
Eviden AWS Native Security services uses AWS native security tools for security posture, threat detection and compliance.
Data from these tools is sent to AWS Security Hub, providing a single pane of glass and making the data actionable. Eviden an atos business further enhances these capabilities by adding Security Operation Center (SOC), reporting and optionally CSIRT, SIEM and Managed Detection and Response (MDR) through Eviden AIsaac.
AWS Infrastructure Vulnerability Scanning >
Automatic scan of AWS infrastructure resources for vulnerabilities.
AWS Resource Inventory Visibility >
Continuous scanning and reporting of all AWS resources, and their configuration details.
AWS Security Best Practices Monitoring >
Detect when AWS accounts and the configuration of deployed resources do not align to security best practices.
AWS Compliance Monitoring >
Configuration compliance based on AWS Config tracking the configuration of resources within an AWS account.
Monitor, Triage Security Events >
Threat Detection based on GuardDuty that continuously monitors for malicious activity and unauthorized behaviour.
24/7 Incident Alerting and Response >
Standard reports are generated that include the security status of each AWS account. Atos experts can provide recommendations with regards to type of alarms, metrics, and reports to be generated depending on the organization’s need.
Distributed Denial of Service (DDoS) Mitigation
A system backed by technology and security experts monitoring 24/7 for Distributed Denial of Service (DDoS) attacks against your AWS applications.
Managed Intrusion Prevention System (IPS) >
Protect your environment from known and emerging network threats that seek to exploit known vulnerabilities.
Managed Detection and Response for AWS Endpoints >
A combination of technology and cloud security experts working to continuously detect, investigate, and remove threats from within your AWS endpoints.
Managed Web Application Firewall (WAF) >
A firewall managed service designed to protect web-facing applications and APIs against common exploits.
Eviden AWS Native Security: for which use cases?
Configuration compliance
Situation
Your organization is using multiple AWS resources and is concerned about the compliance of its infrastructure in AWS.
Solution
Eviden experts leverage AWS Config to continuously audit and assess the overall compliance of your AWS resource configurations against your organizations policies and guidelines.
Security assessment
Situation
Your organization has multiple applications deployed on AWS but is concerned about security vulnerabilities and following best practice.
Solution
Eviden experts combine AWS Inspector automated security assessment capabilities to detect vulnerabilities and deviations from best practice with prioritization of findings to improve the security and compliance of applications deployed on AWS.
Threat detection
Situation
Your organization has multiple workloads in AWS and is concerned about not being able to see all security events related to them.
Solution
Eviden experts combine the power of AWS GuardDuty with its continuously behavior monitoring capabilities, with Eviden cybersecurity expert analysis of your AWS account and workload event data to detect and alert on relevant findings related to potential security threats.
Excessive privileges
Situation
Your organization is concerned that its identity and access management policies in AWS are not aligning to best practices and the principle of least privilege.
Solution
Eviden experts leverage AWS IAM Access Analyzer to check resource policies are deployed according to security best practices such as principle of least privileged in order to improve overall security posture.
Related resources
Brochure
Cybersecurity: Building trust in Hybrid Cloud
The cloud security challenge – The Cloud is a key enabler of digital transformation. It is transforming business, organizations and government, enabling new levels of speed, agility and focus.