SECURING ANY AWS ENVIRONMENT

Spike Reply provides hands-on knowledge in secure AWS environments

Before filling out the registration form, please read the Privacy notice pursuant to Article 13 of EU Regulation 2016/679

Invalid Input
Invalid Input
Invalid Input
Invalid Input
Invalid Input
Invalid Input
Invalid Input

Privacy


I declare that I have read and fully understood the Privacy Notice and I hereby express my consent to the processing of my personal data by Reply SpA for marketing purposes, in particular to receive promotional and commercial communications or information regarding company events or webinars, using automated contact means (e.g. SMS, MMS, fax, email and web applications) or traditional methods (e.g. phone calls and paper mail).

SECURITY WITH AMAZON WEB SERVICES (AWS)

AWS enables businesses to inherit all the best practices of AWS policies, architecture patterns, and operational processes built to satisfy the requirements of the most security-sensitive environments.

24/7 COMMAND CENTER

Spike Reply offers clients a Cyber Security Command Center specialized to services for AWS. Its operations are available 24 hours, 7 days a week and all year long.

THE SECURITY PORTFOLIO

Spike Reply offers tailor-made security services for AWS that are continuously improved to ensure comprehensive protection

  • strip-0 image

    LOGGING, MONITORING, SIEM, THREAT DETECTION AND ANALYTICS

    • Implementation of central logging accounts and (native) automated log aggregation (Cloudwatch, Lambda, Kinesis)
    • Setting up Monitoring or SIEM (Security Information and Event Management) based on several vendor specific (e.g. Elastic, Splunk) and AWS native services (e.g. GuardDuaty, Cloudwatch)
    • Setting up secure operating processes (Incident Response)

  • strip-0 image

    DATA PROTECTION AND ENCRYPTION

    • Enforcing Principle of Least Privilege (POLP)​
    • Creation of fine-grained access policies (e.g. via S3 - bucket policies, IAM Roles, Permission Sets )
    • Designing deletion concepts based on cloud native issues like lifecycle policies, tags etc.
    • Secure SaaS landscape by implementing CASB Solutions (e.g. Netskope)

  • strip-1 image

    GOVERNANCE, RISK & COMPLIANCE

    • Security Baseline design and implementation
    • Implementation of Service Control Policies
    • Implementation of CSPM (Cloud Security Posture Management ) for 3rd party vendors (e.g. Netskope, Aqua, CheckPoint)

  • strip-1 image

    SECURE DEVOPS

    • Implementing cloud native or external Repositories and Build Pipelines (e.g. AWS Developer Tools Suite )
    • Establishing principles for a secure agile development culture Integrating static and dynamic security scanning CI/CD pipelines

  • strip-2 image

    IDENTITY ACCESS MANAGEMENT AND FEDERATION

    • Development of Role concepts
    • Privileged Access Management (AWS Native, Wallix)
    • Implementing Multi-Cloud and Hybrid Cloud federated Identities (AWS SSO, SAML, Web-Identity Federation)
    • Integrating third Party Vendors (e.g. Okta)

  • strip-2 image

    APPLICATION SECURITY

    • API Security (Authentication & Authorization)
    • Microservice Security (securing persistance storage, service mesh configuration check, Kubernetes)
    • Secure native Cloud application architecture
    • Serverless application security (permission scope evaluation)

  • strip-3 image

    NETWORK AND INFRASTRUCTURE SECURITY

    • Secure VPC network segmentation in accordance with on-premises networks (holistic zoning concept)
    • Implementation of suitable perimeter services and next generation firewalls (e.g Cloud Guard, Fortinet)
    • Implementation of AWS Site-to-Site VPN, Direct Connect, Private Link

  • strip-3 image

    BUILT-IN SECURITY FEATURES

    • Integration and Optimization of built-in security features like: AWS Security Hub, GuardDuty, AWS WAF, Shield, Trusted Advisor, Inspector, KMS, CloudHSM, Certificate Manager
    • Setting up hardened infrastructure via KMS, Cloud HSM, Secrets Manager or third party vault service
    • Migration and adoption from third party security vendors to cloud native

EXPERTISE IN NUMBERS

500+ Cyber Security Experts, of which 100 are based in Germany
100+ AWS Specialists
350+ professional certifications on methodologies and products
17+ years of experience in the field of IT Security
AWS Security Competency Premier Consulting Partner
A Cyber Security Command Center with 24x7x365 operations