Most enterprises - whether large or small - are quickly reaping the benefits of the cloud. Cloud service providers, like Amazon Web Services (AWS), offer flexibility and scalability to businesses in every industry.
Unfortunately, IT security pros lose visibility and control over the data flowing in and out of the cloud, as well as when and how new workloads and instances are spun up. Yet, they’re still responsible for AWS security and compliance.
The AWS shared responsibility model establishes that infrastructure security is Amazon’s responsibility and everything else is up to the customer. Specifically, the customer is responsible for protecting data within applications, monitoring how users are accessing this data, detecting threats, and implementing AWS incident response.
Unfortunately, traditional, network-centric security capabilities (e.g. intrusion detection) fall apart when migrated to the cloud, and some like vulnerability assessment - are prohibited by Amazon unless an AWS Vulnerability / Penetration Testing Request Form is filled out and approved.
AlienVault® USM Anywhere™ overcomes these security and compliance challenges and more. In fact, we’ve optimized our AWS sensor to address the biggest cloud security issues in the simplest way.
Designed for AWS environments, AlienVault USM Anywhere delivers essential security capabilities in a way that makes sense in the cloud. It allows you to identify threats in real-time, scan for vulnerabilities, and respond to incidents to reduce risks and demonstrate compliance, no matter where your data, apps, or users roam.
* The ISMS that governs USM Anywhere, USM Central
According to Gartner Research, "Through 2020, 80% of cloud breaches will be due to customer misconfiguration, mismanaged credentials or insider theft, not cloud provider vulnerabilities." It's not the nature of the cloud that introduces security risks, but rather the lack of control that it brings. Anyone in your organization (with a credit card) can deploy new applications, exposing your company and its data to risk - and you may never even know about it. And yet, you’re still responsible for protecting this data.
To do that, you need to know things like:
USM Anywhere gives you the essential visibility and control you need for AWS security and compliance. Unlike traditional security approaches that try to retrofit their network-centric approach to an AWS universe, USM Anywhere is optimized for AWS with support for:
1 Gartner Research Paper, Best Practices for Securing Workloads in Amazon Web Services, April 2015
Compliance mandates like PCI DSS and NERC CIP require that you have implemented the essential security controls to protect sensitive data in your environment. Auditors will want to see proof that you know:
Answering these questions for AWS assets requires that you have the capability to discover new assets, validate Security Group configurations, monitor VPC flow logs, run vulnerability scans and reports, and respond to emerging threats. And bring all that data together in a meaningful way so that you can pass that next audit, as well as maintain a secure posture in this dynamic environment.
USM Anywhere delivers the tools you need in one place so you can achieve a confident security posture and compliance, saving you time and money while benefiting from the speed and agility of AWS. You can deploy USM Anywhere within minutes, and have detailed compliance reports to provide to your auditor as needed.
Nearly all companies have hybrid environments, where some data and apps have migrated to AWS, and others remain on-premises. In this context, it’s essential to have a complete picture into the security posture of this data, as well as the servers and apps that it flows through. But if you’re managing two separate security monitoring infrastructures - one for on-premises systems and another for AWS - you’re working twice as hard and still missing the big picture.
USM Anywhere overcomes this challenge by unifying security monitoring across environments - whether you’re using AWS, Azure, or have on-premises infrastructure to monitor as well. Plus, as a cloud-based security management solution, you can scale your threat detection and response capabilities as your hybrid environment changes, and pay for only what you need, when you need it. With this level of scalability, you can accelerate AWS incident response as well as reduce cost and complexity.