AWS Cloud Security
Secure foundations without slowing delivery.
AWS is powerful and complex. We help you build secure, well-instrumented foundations and reduce the risk that comes with rapid growth. You get clear guidance, hardened baselines, and practical controls that teams can maintain.
Services Provided
Account Hardening
The first stage of cloud infrastructure security begins with the overarching AWS account. Any defaults must be changed and specific hardening measures enabled so that you are protected from security incidents. Successful hardening will also ensure that you are aware of all activities happening within the account and can be alerted to anomalous activities.
Cloud Disaster Recovery and Business Continuity Planning
Within a long enough timeline there is a 100% chance that one of your systems will fail, whether by malicious activity, accident, or acts of nature. Accepting that these situations will happen and then planning around them will prepare your systems to be more resilient and fault tolerant. The goal here is not to make systems never fail, but fail in a way that does not bring down the entire service being provided to customers.
Identity and Access Management
Many issues within AWS occur due to improper privileges applied to users and systems. Identity and access management is an area of security concerned with how users and machines (entities) are properly named in systems and whether these entities have just enough privileges to perform their job, and nothing more. Gaps in identity and access management are how attackers maintain a foothold in systems.
Network Hardening
Being a company in the Cloud, you rely on both a secure and responsive network to be present at all times. Without proper security, holes in your network will allow malicious attackers to gain insight or a foothold into your infrastructure or, worse, into your systems where customer data is being processed.
Secure Infrastructure Review
Your cloud infrastructure is key to providing either a service or product to customers. Without it, we are back to running a brick and mortar store, which is typically not feasible for most tech companies. Your infrastructure should be resistant to intrusion, elastic to expand when customer traffic is high but shrink when the traffic subsides. And most importantly, cost-effective so that you can reinvest those profits into increasing revenue.
System Hardening
Systems, or servers, process data in use and are critical to a successful security program. Whether systems are permanent installations or ephemeral, lasting only minutes, a secure system is one that is borne out of configuration standards and an attention to detail. Understanding how data is being processed and stored on a system is vital to knowing whether your customers' and your proprietary information is safe.
Pricing
We are always up-front and transparent with our fees to save you time and money.
Hourly Rate
$ 185
The services listed on this page operate on a standard hourly rate. As every company has slightly different needs, estimates become increasingly difficult and fixed price contracts are untenable. Pricing is thus allotted in buckets of time. However, a more detailed scope of work may be created upon request.
Rates can vary based on a variety of situations and special requests. These requests can range from urgency, complexity of the system, longevity of the contract, daily or weekly rates, and so on.
Invoices are produced monthly, payment is NET-30. A 15% deposit is due upon contract signing. Applicable taxes may apply as required by law.
All prices are listed in Canadian dollars.