uses cookies for analytics and functionality purposes.To change your cookie settings or find out more, click here. If you continue browsing our website or close this banner, you accept these cookies.

Securing AWS Cloud Management Configurations

The goal of SCM is to reduce risk by ensuring that systems are properly configured for security and compliance standards


Securing AWS Cloud Management Configurations White Paper ScreenshotAmazon has captured nearly half of the cloud market making it a prime target for attacks. When AWS accounts are compromised, the go-to payload is often cryptocurrency mining where attackers make money using stolen CPU cycles that get billed to the victim's account.

Fortunately, there is guidance from the Center for Internet Security (CIS). In 2016, CIS launched the Amazon Web Services Foundations benchmark policy providing recommendations for how to configure a AWS management interface in order to be protected against common threats.

Download this whitepaper to understand:

  • Common sources of AWS compromise
  • CIS policies for mitigating AWS threats
  • General security practices which aren’t covered by the CIS policy
  • Tools available to help determine your AWS security state

Complete the form to the right to learn how to protect your AWS deployment from common threats.

Download File