Mission Cloud Security Healthcheck Powered by CrowdStrike
Deploy your comprehensive security scan in minutes
What's your level of security confidence?
How confident are you in the security posture of your AWS environment, on a scale of 0% to 100%?
The worst feeling to have about security is uncertainty. Do these sound familiar:
- We have an audit coming up, are we ready for it?
- Did we configure that correctly?
- What about that weird behavior we noticed on the cluster the other day…?
Get a real-time window into your cloud security posture
In addition to seeing your security posture visualized through CrowdStrike’s dashboards, our Solutions Architects will meet with you to review critical resource types, like IAM, Storage, and Production Workloads to help you triage issues, assess compliance, prioritize remediations, and identify recurring patterns of compromise.
-
Indicators of Misconfiguration
Indicators of Misconfiguration (IOMs) show when a resource has potentially exposed data or opened up a window of opportunity for an attacker. These are ranked in severity (low to critical) according to the potential for compromise and CrowdStrike’s best practices for cloud security on AWS.
-
Indicators of Attack
Indicators of Attack (IOAs) show when correlated events have occurred within a resource or related resources that indicates an active threat in your environment; that correlation model scores the severity of the alert on a 10 point scale—the higher your number, the greater the risk of compromise/malicious activity.
How your posture is assessed: IAM Roles
In order to detect these indicators and assess your security posture, CrowdStrike creates 2 IAM Roles:
- a read-only role for detecting IOMs.
- a role for detecting IOAs (integrates with CloudTrail and EventBridge to enable near-real-time streaming of logs).
IAM ROLE NAME | DESCRIPTION |
CrowdStrikeCSPMReader-[uniqueId] | For configuration assessment. Has read-only access to AWS services for the detection of insecure configurations through API calls. |
CrowdStrikeCSPMEventBridge | The role is used by EventBridgeRules in customer accounts to allow CrowdStrike to receive the CloudTrail events. |
How the assessment works
01
You create CrowdStrike’s IAM roles for CSPM monitoring on your AWS accounts.
02
Our Solutions Architects meet with you for a discovery call to discuss your security needs, concerns, and objectives.
03
We spend a week (5 business days) reviewing the findings and assessing your overall security health.
04
We take you through a tour of concerns that we’ve identified that merit your attention, based on a combination of your goals (like compliance readiness) and indicator severity; we review and discuss potential remediation strategies.
05
You receive a checklist highlighting the items we discussed with you along with a $1,000 credit toward your AWS bill for completing the process.
Claim Your $1,000 AWS Credit
Get up to $1000 in AWS credit* for completing your healthcheck—reach out to our security experts to start the assessment today or call 855-647-7466.
* AWS Promotional Credits are governed by the AWS Promotional Credit Terms and Conditions. You must have a valid AWS account to redeem a Promotional Credit code. To see the full Terms and learn more, visit https://aws.amazon.com/awscredits/. This promotional offer is not available to state, local, federal government, and other public sector agencies or their employees, officials, or representatives.