Securing data in AWS environments remains a challenging task, especially since Amazon operates on a ‘shared responsibility’ security model. This means that while Amazon physically secures its cloud infrastructure, the customer is responsible for securing their applications and data. Achieving security in the AWS cloud requires diligent monitoring of your AWS environment to identify changes that can leave your assets vulnerable to exploit. Failure to put in place essential security controls can leave you susceptible to an attack.
Additionally, it can be time-consuming and frustrating to follow the procedural requirements that Amazon has put in place to conduct traditional vulnerability scanning of your AWS environment. Most IT teams do not even attempt to do so, meaning that essential AWS vulnerability scanning often does not occur.
AlienVault® USM Anywhere™ addresses this pain point with a purpose-built sensor that is designed to work with the AWS ‘shared responsibility’ model that automatically performs vulnerability scanning with your AWS environment. This AWS-native sensor allows you to ensure continuous vulnerability assessment without having to deal with the cumbersome process required by Amazon to use a traditional vulnerability scanner.
AlienVault USM Anywhere allows you to secure your AWS environment with these critical features:
* The ISMS that governs USM Anywhere, USM Central
Scanning your AWS environment for vulnerabilities and configuration issues can seem like a daunting task given that you can’t use traditional scanning tools in an AWS environment without paperwork or approvals. While Amazon sets up methods to allow traditional vulnerability scanning in your AWS environment, it is difficult and time consuming to satisfy the procedural requirements every time you want to run a scan. Most IT teams do not even attempt to conduct AWS vulnerability scans, meaning that essential vulnerability testing of their AWS environment often does not occur.
You need a security monitoring solution that automates AWS vulnerability scanning and threat detection. AlienVault USM Anywhere provides a unified security platform for your AWS environment that simplifies threat detection by automatically performing vulnerability scanning on assets within your AWS environment. USM Anywhere’s AWS-native sensor resides in your AWS environment and delivers the continuous AWS vulnerability assessment you need to ensure that vulnerabilities and misconfigurations don’t slip through the cracks and leave you exposed.
Once you’ve completed the AWS vulnerability scan, you need to develop a prioritized response plan that identifies the vulnerabilities, configuration issues and access control issues and their potential impact to your environment. Doing this efficiently requires expert knowledge of not only the exploit methods but the affected assets and systems as well.
The USM Anywhere platform with a USM Anywhere Sensor deployed in your AWS infrastructure gives you the ability to find the vulnerabilities that matter most. From the USM Anywhere console, you can quickly identify the critical assets that have vulnerabilities. The vulnerability name, asset, Common Vulnerability Enumeration (CVE), and severity are displayed to identify the most severe vulnerabilities first. From the Vulnerabilities dashboard, you can see at-a-glance which assets are most vulnerable so you can deal with the important, most critical assets first.
Additionally, USM Anywhere is integrated with AlienVault’s Open Threat Exchange (OTX), the world’s first truly open threat intelligence community that enables collaborative defense with actionable, community-powered threat data. Information about each vulnerability can be accessed directly from the platform interface. For a more detailed view of information, USM Anywhere allows you to click through directly to OTX to see detailed information about the vulnerability, how it is used to exploit a system, and reference information collected and known. This provides you with all the information you need to make a decision and respond to the discovered vulnerability.