Strengthening the Security Posture of Your AWS Account
Having explored the different types of attacks you may be subject to, you might be wondering how you can effectively protect your organization against all the threats it will face. This section deals with the steps you can take for the same.
When running a Cloud Security Posture Assessment (CPSA) against your account(s), you will need to create a role that will give read-only permissions to the service or tool performing the assessment. The assessment thoroughly reviews an organization’s cloud security policies, processes, and controls. It can also include an examination of the technical infrastructure that supports the organization’s cloud environment. The assessor can uncover potential weaknesses that an attacker would exploit by reviewing the account’s access controls, conducting vulnerability assessments, and analyzing security logs.
The following is a list of some of the vulnerabilities that are...