AWS Security Assessment

The knowledge and skills you need to evaluate your AWS security posture.

Convergency's AWS Security Assessment is a structured, disciplined and rigorous approach to assessing the effectiveness of any cloud-based environment security.

Our assessment  is comprised of a Methodology, Areas of Focus, and Guiding Principles designed to deliver thorough and accurate cloud-based environment security analysis.

Convergency’s AWS Security Assessment builds upon the AWS Security Checklist and the AWS Well-Architected Framework by incorporating criteria that is essential to organizations operating in the cloud.

The ability to scale security-related services and manage costs are two of the most common pain points customers share when evaluating their security approach. For some, AWS knowledge and skills are additional concerns. Industry-specific regulation, privacy laws and contractual obligations add to the complexity of implementing and maintaining good security.

Common Security Pain Points

 

The Convergency AWS Advisory Services Group brings the knowledge and experience to address scalability, cost, regulatory and compliance criteria by focusing on key factors:

 

  • AWS Security Governance at Scale – How well can you scale security services and manage costs?

  • GDPR, HIPAA & Other Privacy Regulation – How secure is the personal data you collect?

  • Industry Regulation (21 CFR 11, Annex 11, NYDFS & more) – Are you meeting your legal obligation?

  • Commercial Data Contractual Requirements – Is your data where it belongs and in the right hands?

SCHEDULE a

consultation

Speak with a member of our Advisory Services Group about your organization's specific needs and objectives.

Our Methodology

Steps

Define

Define.png
Identify.png

Identify

Assess

Assess.png

Mitigate

Mitigate.png

Protect

Protect.png

Scope

Establish Goals & Objectives

Define.png
Identify.png

Document Assets and Their Security Posture

Assess.png

Evaluate Risks & Impacts

Mitigate.png

Determine Remediation Options

Protect.png

Initiate Projects to Address Threats

Deliverables

AWS Security Checklist

Recommendations

Our Areas of Focus

IAM.png

IDENTITY & ACCESS MANAGEMENT

Define, enforce, and audit user permissions across AWS services, actions, and resources

Detective.png

DETECTIVE CONTROLS

Gain the visibility you need to spot issues before they impact the business, improve your security posture, and reduce the risk profile of your environment

INFRASTRUCTURE PROTECTION

Reduce surface area to manage and increase  privacy for and control of your overall infrastructure on AWS

Data Protection.png

DATA PROTECTION

Controls to automatic data encryption, manage data services and maintain data protection.

Incident Response.png

INCIDENT RESPONSE

 

During an incident, containing the event and returning to a known good state are important elements of a response plan.

Compliance.png

Compliance

 

Security standards are aligned with policies ad well as compliance and regulatory requirements.

Our Difference

AWS provides the tools and the platform to evaluate your security posture. 

Convergency provides the knowledge and experience to apply them to your needs.