Business Requirement & Challenges​
An industry leader in education-focused NBFC wanted to consolidate security incidents from their multiple accounts in the AWS Landing Zone along with different set of security tools stack. Planning to have automation in place for responding effectively to certain security findings, the customer wanted to have security controls to reduce the time taken in the manual response process. They also wanted to strength the overall security posture of their environment in the cloud and mitigate risks in the infrastructure.​
- Vulnerability Management.Â
- Configuration Compliance (CSPM).​
- Security Incident Monitoring.​
- Threat Intelligence. ​
- Zero Trust Network Access (ZTNA)
- Privileged Access Management​
Solution Provided ​
- Wazuh SIEM solution provided with integration with all the accounts in the landing zone and various security tools like DLP, EDR, WAF, etc. ​
- Wazuh Vulnerability Management to scan all the resources in the environment for vulnerabilities and help mitigate the risks associated with it.​
- Wazuh scan all the resources in the cloud to meet standards like ISO 27001, etc.​
- Threat Detection based on the MITRE ATT&CK framework that provide high level overview of the tactics and techniques occurring in devices monitored by Wazuh agent on all accounts.​
- Privileged Access Management for securing, managing and monitoring privileged accounts and activities in the organization.​
- Cyber Intelligence, Brand Monitoring and Attack Surface Monitoring to give context to the customer’s digital risk.​
Business Benefits​
- Automated in security operations.​
- Next generation tools to automate quick remediation of the cyber-threats.​
- Customized compliance dashboards.​
- Complete Vulnerability Management solution to mitigate risks.​
- 24*7 Real time threat monitoring based on the MITRE ATT&CK framework.​
- Data Loss Prevention and Web Proxy
Outcome/Results​
- Enhanced Threat Detection which improved the ability to detect and respond to cyber threats promptly.​
- Risk Mitigation through continuous monitoring of the vulnerabilities ​
Technology Stack​
- Wazuh SIEM/VM/CSPM.​
- CrowdStrike EDR.​
- ARCON PAM.​
- Forcepoint DLP/Proxy.​
- Accops HySecure ZTNA.​
- Cloud Sek Dark Wed​
- AWS Network Firewall.​
- Amazon Guard Duty​
- AWS CloudTrail​
PUBLISHED: 14th November 2024