Cloud Security Approach: 2-months Assessment

Pyxis

Through the CSA, the opportunities for improvement related to the Cloud Infrastructure are identified and weighed, recommending a design that complies with good practices and security standards.

Cloud Security Approach


It is currently important and increasingly necessary to follow and implement the good practices of security in Information Technology, particularly for cloud environments, providers comply with various security standards that apply to their data centers, although they leave the responsibility to their clients to a greater or lesser extent on the final security configurations. Also, it is a common practice that the cloud approach of many companies follow the guidelines of the business, without considering the security from the early stages of defining architecture and infrastructure. As a more immediate consequence, a very high percentage of the incidents of security happens due to poor service configurations or with their default values.

Cloud Security Approach proposes a mandatory look at the infrastructure and services deployed in the Cloud, as well as a vision with the premises of Security by Default and Zero Trust for new solutions. Through the CSA, opportunities for improvement related to the client's infrastructure are identified and weighed, recommending a design that complies with Azure’s good practices and updated security standards.

The phases that make up the CSA are described below:

1.- Current Situation Assessment

A starting point to know the reality of the client, understand the needs and challenges that the client's infrastructure currently has, as well as the new requirements and improvement options that it hopes to obtain. In this way, we work together on definitions of the new Azure Cloud solutions that best suit the business.

2.- Safe Infrastructure Design

Cloud infrastructure development brings with it a set of practices and ways of working that are not fully comparable or equivalent to on-premise scenarios. Therefore, it is necessary to understand how the current reality of the client adapts to a Cloud environment. New forms of access will be considered, identity management, and other aspects that make up the design of information security in the Azure Cloud.

We support the design process based on Azure, we resolve security breaches at the design phase deploying Microsoft Sentinel, Azure Monitor, Identity platform, Azure Defender for Cloud and other services inspired in Microsoft Cybersecurity Reference Architectures.

This is the main phase of the CSA, where the design that best suits the client's needs is defined, considering and prioritizing security according to the best practices and experiences in the area.

3.- Improvement Recommendations

After achieving a design according to the client, the recommendations for improvement will be presented, emphasizing the benefits that will be obtained with the new infrastructure, the considerations that must be taken into account, and other changes that the new configuration may imply

4.- Accompaniment in the Implementation Strategy

We trust that this phase will generate the most important added value for the client, where the guidelines suggested in the previous phases will be followed, a new stable and reliable solution will be achieved with the security guarantees that have been agreed upon.

We join the client in these first steps, advising and clearing up any doubts that may arise during the implementation stage.

https://store-images.s-microsoft.com/image/apps.17096.54998018-daa9-4ca4-886b-cea4c96b885f.fd661b38-a3d9-4779-9878-ea113fe6ac6e.5dc783c7-2386-4063-81ba-0abb9447f0d6
/staticstorage/eaf6278/assets/videoOverlay_7299e00c2e43a32cf9fa.png
https://store-images.s-microsoft.com/image/apps.17096.54998018-daa9-4ca4-886b-cea4c96b885f.fd661b38-a3d9-4779-9878-ea113fe6ac6e.5dc783c7-2386-4063-81ba-0abb9447f0d6
/staticstorage/eaf6278/assets/videoOverlay_7299e00c2e43a32cf9fa.png
https://store-images.s-microsoft.com/image/apps.29152.54998018-daa9-4ca4-886b-cea4c96b885f.e363f3af-953c-4034-8e86-7adf55a8ffb5.15edaf80-4355-4dc5-afbb-bfa3c32c74d5
https://store-images.s-microsoft.com/image/apps.55006.54998018-daa9-4ca4-886b-cea4c96b885f.e363f3af-953c-4034-8e86-7adf55a8ffb5.9ac466de-485c-427c-ba23-df247b47a409
https://store-images.s-microsoft.com/image/apps.50479.54998018-daa9-4ca4-886b-cea4c96b885f.e363f3af-953c-4034-8e86-7adf55a8ffb5.c97a8e27-b929-4630-9083-47a248b4841c
https://store-images.s-microsoft.com/image/apps.22229.54998018-daa9-4ca4-886b-cea4c96b885f.b0910a6c-764b-4dcd-86c8-00ebe0e955dd.73268c8a-b95b-47cb-940f-9d96e0352da6
https://store-images.s-microsoft.com/image/apps.55725.54998018-daa9-4ca4-886b-cea4c96b885f.e363f3af-953c-4034-8e86-7adf55a8ffb5.43e40e4f-6e2f-48d4-b398-e93209b43a6e