CLOUD SECURITY PREVENTATIVE CONTROLS SOLUTION

Cyber security is a salient and evolving issue in the digital world. Both companies and users are victims of cyber security crises. With the prosperous future of the cyber security market, the technology and professionalism to protect cloud computing systems is actually in shortage. Despite rapid adoption of cloud computing, security remains a primary issue for cloud customers.

Although it was logical to use a certain amount of time and labor to manually implement cyber security codes for special occasions, it was still unnecessary for the repeated procedures. Implementing the codes can be a slow, tedious, and fatiguing process. Such work is not a labor-saving workflow, but an inefficient investment for a company.

Although the work was redundant, it still needs experienced manager to operate the whole process. The cost of experienced staff was unmeasurable loss for the team.

What makes us different

Under the guidance of an Advisory Specialist Leader at Deloitte, who have more than 20 years of experience in the field of cyber security, our team gained knowledge and expertise cover the whole cyber-security chain of value: identification, protection, detection, response and recovery. We deliver these knowledge within our product with a focus in automation of EKS preventative controls and implement AWS architecture for provided business need.
Our project is part of Deloitte Cyber Cloud Managed Services (CCMS).


Check out more information about CCMS:
CCMS Landing Page

Our Product

  • Trackable security policies and rules. Administrators can easily read security policies implemented by through codes.

  • Cloud implementation. Our cloud implementation make our product more replicable, scalable, and adds an extra layer of security to the security guidelines followed by cloud distributors.

  • Complete automation. Complete automation prevent human errors, improve implementation efficiency, save both time and money.

  • Flexibility. Policies designs in our product is designed to fit most businesses, and could be modified by our experts to fit specific needs.

How It Works

Our solution will create an automatic preventive control for protection to prevent malicious actions or attacks toward you or your company, which is especially crucial for the cloud system and important data and documents.

DEMO

With Cloud Formation projects created by the AWS Cloud Development Kit (CDK), we will have the project template to run through the policy engine and determine whether it will expose you to vulnerabilities.

You could choose our pre-written policies, or policies from the National Institute of Standards and Technology (NIST), or your own customized policies. The policies will check service you deployed; any action that's violating the policy you chose will be stopped and warnings will be sent back to you.

Our product will be able to make automated preventive controls for your system. All policies will be implemented as code and talked via the open policy agency (OPA) with our server. It will be much more reliable and efficient than implementing policies manually.

More Posts




Would like to learn more? Contact us!

...
Jenny Rong

Backend Engineer

rongt2@uw.edu

...
Yi Zhong

Backend Engineer

winnieyizhong@gmail.com

...
Wei Yang

Backend Engineer

weiy33@uw.edu

...
Yinan Guo

Backend Engineer

yguo17@uw.edu