AWS Security

AWS Foundation
Security Assessment

A comprehensive 2-week review of your entire AWS environment. We identify every critical misconfiguration, overly permissive IAM policy, and exposed resource — then give you a prioritized roadmap to fix them.

$2,500
Fixed-fee engagement
2-Week Delivery
From kickoff to final report
Book a Free Strategy Call

What We Assess

Our assessment covers all six critical domains of AWS security, mapped directly to the CIS AWS Foundations Benchmark v1.5 and SOC 2 CC6.1.

🔒

Identity & Access Management (IAM)

Root account usage, MFA enforcement, overly permissive policies, unused credentials, and IAM Identity Center configuration.

🔒

S3 Bucket Security

Public access settings, bucket policies, ACLs, encryption at rest, versioning, and replication configurations.

🔒

Network Security (VPC)

Security group rules, NACLs, open ports, internet-facing resources, VPC flow logs, and Transit Gateway configurations.

🔒

Logging & Monitoring

CloudTrail enablement, S3 access logging, CloudWatch alarms, GuardDuty, Security Hub, and Config Rules.

🔒

Encryption & Key Management

KMS key policies, EBS encryption, RDS encryption, Secrets Manager usage vs. hardcoded credentials.

🔒

Compute & Container Security

EC2 instance profiles, IMDSv2 enforcement, ECS/EKS security configurations, and ECR image scanning.

Your Deliverables

📄

Executive Summary Deck

A non-technical presentation for leadership summarizing risk posture, top findings, and business impact.

📄

Technical Findings Report

Detailed findings with evidence screenshots, affected resources, risk ratings, and remediation steps.

📄

Prioritized Remediation Roadmap

A 30/60/90-day action plan ranked by business risk — not just CVSS score — so your engineers know exactly what to fix first.

📄

CIS & SOC 2 Mapping Matrix

Every finding mapped to the specific CIS Benchmark control and SOC 2 Trust Service Criteria it violates.

How the 2-Week Engagement Works

1

Kickoff Call

Day 1. Scope confirmation, read-only IAM role setup, and intake questionnaire review.

2

Automated Scan

Days 2–4. Prowler and ScoutSuite scans across all regions. 200+ checks executed.

3

Manual Review

Days 5–9. Deep manual analysis of IAM policies, network configs, and architecture.

4

Report Delivery

Day 14. Final report, executive deck, and remediation roadmap delivered to your SharePoint portal.

Ready to Know What's Exposed in Your AWS Account?

Book a free 30-minute strategy call. We'll walk through your environment and confirm whether this assessment is the right fit.

📅 Book a Free Strategy Call Send Us a Message

Download the Free AWS Security Checklist

50 critical AWS security checks covering IAM, S3, networking, logging, and encryption — mapped to the CIS AWS Foundations Benchmark. Used on every engagement.

  • ✅ 50 critical AWS security checks
  • ✅ Mapped to CIS AWS Foundations Benchmark
  • ✅ Instant PDF download after signup

Download the Free AWS Security Checklist

50-point framework used by Alpha Cybersecurity — instant PDF delivery

Powered by Microsoft Forms — your data stays within our secure Microsoft 365 tenant.

#128197; Book a Free Strategy Call rarr;