Services designed to help protect the confidentiality, integrity, and availability of systems and data in your organization's growing cloud environments.
Praetorian's cloud security assessment services are designed to help your organization navigate through the unique security responsibilities associated with operating in today's public cloud environments. Understanding the separation of responsibility and control is needed to effectively direct your organization's internal security, risk and compliance teams and external auditors.
Addressing security in a public cloud environment is slightly different than in your on-premises data centers. When you move systems and data to the cloud, security responsibilities become shared between your organization and the cloud service provider. Infrastructure as a Service (IaaS) providers, such as Amazon Web Services (AWS), are responsible for securing the underlying infrastructure that supports the cloud, and you are responsible for anything you put on the cloud or connect to the cloud.
When operating in cloud environments, your organization assumes responsibility and management of all guest operating systems (including updates and security patches) and other associated application software, as well as the configuration of security group firewalls offered by cloud solution providers such as AWS.
Care must be taken when choosing which services you adopt within cloud environments, because your responsibilities vary depending on the services in use, the integration of those services into IT environments, and applicable laws and regulations. Enhancing security and/or meeting more stringent compliance requirements is possible by leveraging technology such as host-based firewalls, host-based intrusion detection/prevention, and encryption.
It's more than cloud security best practices. Obtain an accurate understanding of your security and risk posture, while ensuring compliance with industry regulators.
The overall goal of an application security assessment is to uncover software vulnerabilities, demonstrate the impact of weaknesses, and provide recommendations for mitigation. Our security engineers will provide a detailed and in-depth security analysis of your organization's critical applications.
Praetorian engineers will remotely identify the networks, hosts, and services that comprise your cloud's external and internal environments. Vulnerabilities are identified and if desired, exploited during a penetration test.
Host reviews comprehensively identify security issues within your cloud environment. Praetorian engineers remotely review the configuration of key applications, servers, databases, and network components to identify vulnerabilities that may go unnoticed during network testing.
A network architecture review will evaluate the function, placement, and gaps of existing security controls and compare their alignment with the organization's security goals and objectives.
The VPN review compares your current configuration against recommended best practices and identifies any areas of concern. The assessment includes a remote configuration review as well as an architecture review.
Analyze both the configuration of the host-based firewalls (accounts, logging, patch management, etc.) as well as the implementation of network security controls (ACLs) via the firewall.