AWS Configuration Review

For organizations migrating to the Cloud or maintaining cloud applications, regular modifications to the network configuration, user access, application architecture, platform components, and security controls are necessary to keep up with business need. But even if reasonable change management processes are in place, deployment mistakes, configuration drift, and bad practices have the potential to introduce security flaws and exacerbate risks in time.

Goal is to identify weaknesses in the cloud infrastructure that deviate from security standards, and expose architectural flaws. 

Phase 1
Identity and Access Management

During this phase, our engineers will test for misconfigurations in Multifactor Authentication, IAM Policies, Root account etc.

Phase 2
Logging

This phase includes analysis of misconfigurations in Cloudtrails, VPC Flow logging, S3 bucket Used for logging, AWS Config etc.

Phase 3
Monitoring

This phase includes analysis of log metric enablement of different AWS Services changes like S3 bucket policy changes, VPC Changes , usage of root account etc.

Phase 4
Networking

This phase includes  verification of inbound and outbound network Access control list among VPC, Security groups, Peering etc.

Phase 5
AWS Security Best Practices

This phase involved analyis of ruleset configured and misconfigurations in API Gateways , Cloud front , Code build , DMS, Dynamodb etc

Phase 6
Reporting

We will provide two kind of report and flexible with logging all the issues on any Bug-ticketing platform such as JIRA. We will provide weekly tracker updates and also provide you detailed executive summary.

Our Services

Vulnerability Management

Assessment

Cloud Security

Security Compliances

Source Code Review

Digital Forensics

Contact Us