Security On AWS

Get visibility into the unique cloud security and compliance risks on Amazon Web Services.

Background
security-aws-1

More User Autonomy Means More Responsibility For Cloud Security

Cloud security is not the responsibility of AWS alone, but is shared between AWS and you, the customer.

While AWS is responsible for protecting the physical infrastructure “of” the cloud, the customer is responsible for correct service configurations.

• Customer data
• Platform, applications, identity and Access Management
• Operating system, Network and Firewall Configuration
• Client-side Data Encyrption, and Data Integrity Authentication
• Server-side Encyrption (File System and/or Data)
• Network Traffic Protection (Encyrption/ Integrity/ Identity)
icon

customers

Responsibility for security ‘IN’ the cloud

SOFTWARE
• Compute
• Database
• Networking
SOFTWARE
• Availibility Zones
• Regions
• Edge Locations
icon

aws

Responsibility for security ‘OF’ the cloud

Cloud Misconfiguration Is A Major Cause of Cloud Security Incidents.

Because threat actors are now targeting exploitable configuration states of cloud services, organizations without the dedicated cloud security expertise need focused solutions to get a step ahead of these attackers.

elipse

Achieving Security Best Practices On AWS

AWS offers native security tools like IAM and Inspector to address different risk areas in your cloud environment, though these tools are more suited for expert cloud users.

Warden is designed to be beginner-friendly. Complementary to these native tools, Warden builds rules to help any organization scan its cloud security posture against best practices.

About Warden

DETECTIVE CONTROLS

Identify potential security threats or incidents

GUARDDUTY
CONFIG

DETECTIVE CONTROLS

Data classification and encryption best practices that support business objectives

MACIE

IDENTITY AND ACCESS MANAGEMENT

Only authorized and authenticated users are able to access your resources

IAM
ORGANISATIONS

INFRASTRUCTURE PROTECTION

Control methodologies critical for successful, ongoing operations in the cloud

INSPECTOR

INCIDENT RESPONSE

Processes to respond to and mitigate the potential impact of security incidents

CLOUDTRAIL

LEVERAGE WARDEN’S CONTINUOUS RISK MONITORING

As organizations innovate in the cloud, having continuous security assurance helps them track all their configuration changes to more quickly comply to AWS security best practices.

screen

See how Warden can help address the top security risks on your AWS cloud environment.

Background