With CloudHealth, our Next Generation Managed Services (NGMS) team gets a holistic viewpoint across all our accounts to ensure compliance.
Cloud security starts with users. Without proper access controls and identity management, users can intentionally or unintentionally create security flaws with catastrophic outcomes.
According to Gartner, “through 2022, at least 95% of cloud security failures will be the customer’s fault.”1 Therefore, organizations must understand their role in the shared responsibility model and take a proactive approach to cloud sercurity. As organizations continue to move production assets to the public cloud, it becomes critical to implement and closely monitor controls.
With CloudHealth, our Next Generation Managed Services (NGMS) team gets a holistic viewpoint across all our accounts to ensure compliance.
The CloudHealth platform helps you validate that you’ve properly and securely configured your Amazon Web Services (AWS) accounts, services, and resources. With configurable policies covering identity and access management, logging and monitoring, network security, and audit trails, CloudHealth identifies violations and makes recommendations for how you can improve your security posture.
The platform provides two default security policies, one based on The Center for Internet Security (CIS) AWS Foundations Benchmark and the other based on AWS Security Best Practices. You also have the option to create your own framework using a variety of individual policies.
The CIS checks are fantastic, because that allows me to see the exact level of control I have over my system, and understand whether we’re in compliance, all in one place.
CloudHealth offers a dynamic policy engine, enabling you to drive optimization in an automated fashion. With CloudHealth Security Policies for AWS, you can:
1 Gartner, Clouds Are Secure: Are You Using Them Securely?, Jay Heiser, 31 January 2018
The CloudHealth platform helps you validate that you’ve properly and securely configured your Amazon Web Services (AWS) accounts, services, and resources.
In his RSA Conference keynote, Pat Gelsinger talked about the fractured nature of the...READ MORE
Let’s admit it—if you’re in cloud security, you’re in a race with thousands of attackers...READ MORE