Conducted by Professionally Certified Cloud Security Professionals. Book your initial conversation today.

  • AWS, GCP or Azure Security Audits, Compliance Audits
  • Identity and Access Management Best Practices - Roles, SSO Groups, Multi Account / Cross account / Cross subscription / Cross Project access, Org Level Constraints, Service Control Policies and more.
  • Securing your Network  – VPC FW Rules, IDS/IPS, Segmentation, Hybrid DNS, Automated Non Compliance Detection, transit gateways, private endpoints and network intrusion monitoring.
  • Securing your Servers, Securing Your Applications.
  • Logging, Monitoring, Alerting, Incident Response Configuration of all services and hosted assets. Advanced Monitoring Strategies.
  • Data Protection – Cloud Managed CMKs, Bring your own CMKs, Certificates Management, Hook your existing HSM product to a cloud HSM. Automated Certificate Provisioning.
  • CSPM, Preventive Controls, Vulnerability Management, Incident Response

 

 

 

 

 

 

 

 

Security can never be an afterthought.  From inspecting your existing IAM, Networking and Service controls implementation to going through a checklist of over a 100 security focused items, here is partial list of what the GCP Security Audit or AWS Security Audit contains:

  • Review of Identity and Access Management to Cloud Resources, including custom roles, Custom Service Accounts, IAM Policy Bindings, gSuite and OAuth based authentication and more.
  • Review of Infrastructure Security – Hybrid DNS, Automated Non Compliance Detection, Cloud Armor, Firewall Rules, private endpoints and application monitoring and network intrusion monitoring.
  • Review of Logging, Monitoring, Alerting, Incident Response Configuration of all services and hosted assets. Advanced Monitoring Strategies, including Cloud Run based event notifications (introduced in 2020).
  • Review of Data Protection – Cloud Managed DEKs and KEKs, CMEKs , CSEKs, Certificates Management, Existing HSM products feasibility to connecting with a cloud HSM. Automated Certificate Provisioning using open source tools.
  • Review of Layer 7 Security – Cloud WAFs, 3rd Party NextGen Firewall Appliances on the cloud, Stackdriver and Cloudwatch agents based monitoring of app layer metrics.

Start the conversation today.   Security cannot be an afterthought (™).