CloudCheckr continuously monitors and analyzes your AWS security and immediately identifies and mitigates every security threat. This video provides an overview of CloudCheckr’s security capabilities.
“The Continuous Diagnostics and Mitigation (CDM) Program provides tools and services that enable federal and other government IT networks to strengthen the security posture of their cyber networks.”
United States Computer Emergency Readiness Team
CloudCheckr unifies CloudTrail data, VPC flow logs, Config logs, API calls and CloudWatch metrics to create a complete picture of user’s exposures and risks.
CloudCheckr dynamically identifies and analyzes publicly accessible objects, network ACL rules, subnets, gateways, DHCP option sets and more to instantly identify weaknesses & gain control.
CloudCheckr detects all changes to AWS and provides actionable intelligence to ensure that all changes to configurations, resources, and security groups, are captured, reported, and stored.
CloudCheckr enables users to fulfill their shared security responsibilities by identifying and offering mitigation instructions for AWS C2S infrastructure.
CloudCheckr saves and reports a complete history of all resources, configuration, users, actions, and permissions to fulfill CDM compliance mandates.
CloudCheckr enables user to understand their environment and exposure, identifies potential security issues, and provides instructions and automation for mitigation of risks.
CloudCheckr adds context to all of your AWS CloudTrail logs to help decipher the hundreds of CloudTrail events into actionable information.
AWS security configurations have many challenges. Proper management needs to be in place to mitigate security breach events and also ensure that all actions are recorded and can be used for auditing purposes in the future.