Optiv + Global 200 Airline = AWS Cloud Services that go Above & Beyond

 

Download

Industry Served: Transportation


Our Starting Point

  • Implement and secure AWS cloud services for use at the enterprise level
  • Consolidate logging architecture for easier ongoing maintenance
  • Counteract the increased risk of breach that comes with cloud technology
  • Evolve overall cloud security through best practices
  • Help our client to keep up with the latest technology and regulations

 


Accelerating Forward

  • Implemented permissions boundaries and reviewed secure copy protocol and IAM policies for least privilege
  • Provided best practices for perimeter security, specifically AWS environment ingress and egress
  • Reviewed the client’s control framework for completeness and deduplication, proposed automated controls and remediation and mapped the client’s controls back to CIS and NIST frameworks

Client Outcomes

  • Successfully consolidated logging architecture through QRadar SIEM
  • Implemented permissions boundaries & least privilege policies for Service Control Policies and IAM
  • Ensured best practices for perimeter security
  • Simplified ongoing maintenance of their fleet through servicing logs
  • Helped client to stay competitive by allowing them to focus on customer service instead of cloud security

 

The Situation – evolve cloud security in a competitive industry

A Global 200 airline approached Optiv to help implement AWS (Amazon Web Services) cloud services, evolve their cloud security practices and consolidate their logging architecture. As part of the fiercely competitive airline industry, they needed to lower costs while delivering better quality service than their competitors. They also needed to keep up with the ongoing maintenance of their fleet through servicing logs, as well as the latest technology and regulations.

 

While cloud technology allows employees to access data from anywhere, it also opens the door for potential malicious actors. So, it was crucial we implement stronger security practices to counteract this increased risk.

 

The Solution – best practices & automated controls

Actively joining our airline client’s agile process, we worked in two-week sprints to evolve their cloud security program and overall cloud journey. Working closely with the client, we consolidated their logging architecture to ingest AWS logs into QRadar. For identity access management (IAM), we kept the collaboration going to implement permissions boundaries and review secure copy protocol (SCP) and IAM policies for least privilege. 

 

Next came providing best practices for perimeter security, specifically how to best handle ingress and egress into and from the AWS environment. After reviewing their control framework for completeness and deduplication, we proposed automated controls and remediation and mapped the client’s controls back to CIS and NIST frameworks. 

How can we help you secure greatness?

 

Optiv can advise on, deploy and operate end-to-end cybersecurity programs aligned to your business goals. As the cyber advisory and solutions leader, we serve nearly 6,000 companies across every major industry. Our certified experts can help you gain the agility, security, scale and control you need to stay ahead of the competition.

 

Would you like to speak to an advisor?

How can we help you today?

Image
field-guide-cloud-list-image@2x.jpg
Cybersecurity Field Guide #13: A Practical Approach to Securing Your Cloud Transformation
Image
OptivCon
Register for an Upcoming OptivCon

Ready to speak to an Optiv expert to discuss your security needs?