<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Andy Mommerency, Author at Cloudar</title>
	<atom:link href="https://cloudar.be/author/andycloudar-be/feed/" rel="self" type="application/rss+xml" />
	<link>https://cloudar.be/author/andycloudar-be/</link>
	<description>100% Focus On AWS // 100% Customer Obsession</description>
	<lastBuildDate>Mon, 02 Jun 2025 09:22:01 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
	<item>
		<title>Cloudar Achieves AWS SMB Competency</title>
		<link>https://cloudar.be/awsblog/cloudar-achieves-aws-smb-competency/</link>
		
		<dc:creator><![CDATA[Andy Mommerency]]></dc:creator>
		<pubDate>Mon, 02 Jun 2025 09:22:01 +0000</pubDate>
				<category><![CDATA[Cloudar news]]></category>
		<category><![CDATA[Company news]]></category>
		<guid isPermaLink="false">https://cloudar.be/?p=22613</guid>

					<description><![CDATA[<p>Cloudar Earns AWS SMB Competency: Helping Small and Medium Businesses Thrive in the Cloud We’re proud to share some exciting news: Cloudar has achieved the AWS Small and Medium Business (SMB) Competency—a recognition that highlights our deep expertise in helping SMBs leverage the power of AWS to grow, innovate, and compete in today’s fast-moving digital [&#8230;]</p>
<p>The post <a href="https://cloudar.be/awsblog/cloudar-achieves-aws-smb-competency/">Cloudar Achieves AWS SMB Competency</a> appeared first on <a href="https://cloudar.be">Cloudar</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h3 data-start="159" data-end="252"><strong data-start="159" data-end="252">Cloudar Earns AWS SMB Competency: Helping Small and Medium Businesses Thrive in the Cloud</strong></h3>
<p class="" data-start="254" data-end="530">We’re proud to share some exciting news: <strong data-start="295" data-end="370">Cloudar has achieved the AWS Small and Medium Business (SMB) Competency</strong>—a recognition that highlights our deep expertise in helping SMBs leverage the power of AWS to grow, innovate, and compete in today’s fast-moving digital world.</p>
<p class="" data-start="532" data-end="782">For many small and medium-sized businesses, the cloud represents both an opportunity and a challenge. Limited resources, time constraints, and evolving customer demands make it critical to choose the right technology partner. That’s where we come in.</p>
<p class="" data-start="784" data-end="1140">At <strong data-start="787" data-end="798">Cloudar</strong>, we’ve built our reputation by delivering <strong data-start="841" data-end="900">tailor-made, cost-effective, and scalable AWS solutions</strong>—with a strong focus on simplicity, security, and performance. Whether you&#8217;re a fast-growing startup or a well-established company looking to modernize, our <strong data-start="1057" data-end="1096">local team of AWS-certified experts</strong> is here to guide you every step of the way.</p>
<h3 class="" data-start="1142" data-end="1181">Why This Competency Matters for You</h3>
<p class="" data-start="1183" data-end="1312">Earning the AWS SMB Competency is more than just a badge. It confirms that Cloudar has a <strong data-start="1272" data-end="1311">proven track record of helping SMBs</strong>:</p>
<ul data-start="1314" data-end="1600">
<li class="" data-start="1314" data-end="1382">
<p class="" data-start="1316" data-end="1382"><strong data-start="1316" data-end="1352">Optimize their IT infrastructure</strong> for flexibility and agility</p>
</li>
<li class="" data-start="1383" data-end="1449">
<p class="" data-start="1385" data-end="1449"><strong data-start="1385" data-end="1401">Reduce costs</strong> by leveraging right-sized cloud architectures</p>
</li>
<li class="" data-start="1450" data-end="1538">
<p class="" data-start="1452" data-end="1538"><strong data-start="1452" data-end="1487">Improve security and compliance</strong>, without the need for complex in-house solutions</p>
</li>
<li class="" data-start="1539" data-end="1600">
<p class="" data-start="1541" data-end="1600"><strong data-start="1541" data-end="1573">Scale operations efficiently</strong> as business needs evolve</p>
</li>
</ul>
<p class="" data-start="1602" data-end="1842">Our customer-centric approach means we take the time to <strong data-start="1658" data-end="1692">understand your business goals</strong>, not just your technical requirements. From initial strategy to hands-on implementation and ongoing support, we become a true extension of your team.</p>
<h3 class="" data-start="1844" data-end="1880">Real Results for Real Businesses</h3>
<p class="" data-start="1882" data-end="2147">We’ve helped dozens of SMBs in the Benelux and beyond to transform their operations with AWS. From e-commerce platforms and SaaS providers to manufacturing and logistics companies, our clients trust us to deliver <strong data-start="2095" data-end="2146">cloud environments that work—today and tomorrow</strong>.</p>
<p class="" data-start="2149" data-end="2406">Curious how we can support your journey? Take a look at some of the solutions we’ve delivered and the value they’ve created:</p>
<p data-start="2149" data-end="2406"><a class="c-link" href="https://cloudar.be/services-solutions/services-for-small-and-medium-businesses/" target="_blank" rel="noopener noreferrer" data-stringify-link="https://cloudar.be/services-solutions/services-for-small-and-medium-businesses/" data-sk="tooltip_parent">https://cloudar.be/services-solutions/services-for-small-and-medium-businesses/</a></p>
<p>The post <a href="https://cloudar.be/awsblog/cloudar-achieves-aws-smb-competency/">Cloudar Achieves AWS SMB Competency</a> appeared first on <a href="https://cloudar.be">Cloudar</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Elevating cloud security to new heights: Cloudar earns AWS Security Competency!</title>
		<link>https://cloudar.be/elevating-cloud-security-to-new-heights-cloudar-earns-aws-security-competency/</link>
		
		<dc:creator><![CDATA[Andy Mommerency]]></dc:creator>
		<pubDate>Tue, 26 Sep 2023 07:49:47 +0000</pubDate>
				<category><![CDATA[AWS Blog]]></category>
		<category><![CDATA[Cloudar news]]></category>
		<category><![CDATA[Company news]]></category>
		<category><![CDATA[Security & Compliance]]></category>
		<guid isPermaLink="false">https://cloudar.be/?p=21033</guid>

					<description><![CDATA[<p>Introduction At Cloudar, we&#8217;ve always believed that security should be at the heart of every cloud strategy. Our commitment to delivering top-notch cloud security solutions has led us to achieve numerous milestones, and today, we&#8217;re excited to announce our latest achievement: Cloudar has earned the prestigious AWS Security Competency! Building on our ISO/IEC 27001 certification [&#8230;]</p>
<p>The post <a href="https://cloudar.be/elevating-cloud-security-to-new-heights-cloudar-earns-aws-security-competency/">Elevating cloud security to new heights: Cloudar earns AWS Security Competency!</a> appeared first on <a href="https://cloudar.be">Cloudar</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>Introduction</h2>
<p>At Cloudar, we&#8217;ve always believed that security should be at the heart of every cloud strategy. Our commitment to delivering top-notch cloud security solutions has led us to achieve numerous milestones, and today, we&#8217;re excited to announce our latest achievement: <strong>Cloudar has earned the prestigious AWS Security Competency!</strong></p>
<p>Building on our ISO/IEC 27001 certification since 2018 and our existing AWS competencies, this accomplishment marks a significant milestone in our journey to provide the highest level of security and service to our customers. In this blog post, we&#8217;ll dive into what the AWS Security Competency means for us and, more importantly, what benefits it brings to our valued customers.</p>
<p>&nbsp;</p>
<h2>What is AWS Security Competency?</h2>
<p>The AWS Security Competency is not just a fancy title; it&#8217;s a recognition of excellence in designing, implementing, and managing security solutions on the Amazon Web Services platform. AWS awards this competency to organizations that demonstrate exceptional proficiency in securing AWS workloads and infrastructure.</p>
<p>&nbsp;</p>
<h2>Why it matters</h2>
<h3>Expertise You Can Trust</h3>
<p>Achieving the AWS Security Competency is a rigorous process that involves a deep evaluation of an organization&#8217;s expertise in various security domains such as identity and access management, data protection, compliance, and more.<br />
This achievement is a seal of approval from Amazon Web Services itself.<br />
It means that Cloudar&#8217;s team of experts possesses a comprehensive understanding of AWS security best practices, threat detection, and incident response. It signifies that we have demonstrated proficiency and skill in protecting your cloud infrastructure and data, giving you peace of mind that your assets are in capable hands.</p>
<h3>Cutting-Edge Solutions</h3>
<p>Our team at Cloudar stays at the forefront of security technology. Achieving the AWS Security Competency ensures that we are equipped with the latest knowledge and tools to keep your AWS environments secure from evolving threats.<br />
Our partnership with Trend Micro played a crucial role in this accomplishment. Trend Micro is a global leader in cloud security, and our collaboration has allowed us to leverage their cutting-edge technology and expertise to enhance our security solutions. Together, we&#8217;ve created a formidable team dedicated to safeguarding our customers&#8217; cloud environments.</p>
<h3>Dedication to Continuous Improvement</h3>
<p>Security is not a static field; it&#8217;s an ever-evolving landscape. To maintain this competency, Cloudar continues to invest in training and staying up-to-date with the latest security trends and technologies. We are committed to providing our customers with the most advanced security solutions available.</p>
<h3>Proven Track Record</h3>
<p>Our attainment of this competency underscores our extensive experience in designing, implementing, and managing secure AWS solutions.<br />
We understand that one-size-fits-all security solutions rarely work. Cloudar&#8217;s expertise allows us to tailor security measures to your unique needs, ensuring that your AWS environment is both secure and efficient. We&#8217;ve successfully tackled complex security challenges for customers across various industries, consistently delivering exceptional results.</p>
<p>&nbsp;</p>
<h2>Benefits for our customers</h2>
<h3>Compliance Assurance</h3>
<p>As an ISO/IEC 27001 certified company, Cloudar understands the importance of compliance.<br />
With Cloudar&#8217;s AWS Security Competency, you can trust us to help you meet and exceed regulatory compliance requirements. Our deep understanding of AWS services ensures that your cloud infrastructure aligns with industry-specific standards, making audits and certifications a breeze.</p>
<h3>Enhanced Security Posture</h3>
<p>With our AWS Security Competency and other AWS competencies, you gain access to top-tier security practices and expertise.<br />
We go above and beyond to ensure your AWS environments are fortified against potential threats and vulnerabilities, significantly reducing the risk of data breaches and disruptions.</p>
<h3>Cost Savings</h3>
<p>Investing in security is an investment in your business&#8217;s longevity. By preventing costly breaches and downtime, Cloudar&#8217;s expertise can save you substantial financial resources in the long run.</p>
<h3>Increased Efficiency</h3>
<p>Our tailored security solutions are designed to integrate seamlessly with your existing AWS environment. This ensures that security measures do not impede your operations, allowing for increased efficiency and productivity.</p>
<h3>Peace of Mind</h3>
<p>In the event of a security incident, Cloudar&#8217;s well-practiced incident response teams are ready to spring into action. Our proactive security measures help mitigate threats before they become major issues, minimizing downtime and data loss.<br />
With Cloudar as your trusted AWS Security Competency partner, you can focus on growing your business, knowing that your cloud infrastructure is fortified against threats. Sleep better at night, knowing that experts are on guard.</p>
<p>&nbsp;</p>
<h2>Conclusion</h2>
<p>Achieving the AWS Security Competency is not just an accolade for Cloudar; it&#8217;s a testament to our unwavering dedication to providing the highest level of security for our customers’ AWS environments.</p>
<p>We are committed to keeping your data safe, your operations efficient, and your business thriving. Your cloud&#8217;s security is our priority, and together, we&#8217;ll reach new horizons.</p>
<p>To learn more about how Cloudar can secure your AWS environment and help your business grow securely, contact us today and experience the difference of working with an AWS Security Competency holder!</p>
<p>&nbsp;</p>
<p>The post <a href="https://cloudar.be/elevating-cloud-security-to-new-heights-cloudar-earns-aws-security-competency/">Elevating cloud security to new heights: Cloudar earns AWS Security Competency!</a> appeared first on <a href="https://cloudar.be">Cloudar</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Get it covered: 7 essential practices for AWS security</title>
		<link>https://cloudar.be/awsblog/get-it-covered-7-essential-practices-for-aws-security/</link>
		
		<dc:creator><![CDATA[Andy Mommerency]]></dc:creator>
		<pubDate>Fri, 14 Jul 2023 13:42:15 +0000</pubDate>
				<category><![CDATA[AWS Blog]]></category>
		<category><![CDATA[Security & Compliance]]></category>
		<guid isPermaLink="false">https://cloudar.be/?p=20704</guid>

					<description><![CDATA[<p>In today’s ever-changing threat landscape, cloud security cannot be emphasized enough. Although the AWS platform provides organizations with a dependable, scalable and cost-effective solution for storing and processing sensitive data, organizations must implement their own AWS security best practices as part of the shared responsibility model. Here are seven crucial practices that can help you [&#8230;]</p>
<p>The post <a href="https://cloudar.be/awsblog/get-it-covered-7-essential-practices-for-aws-security/">Get it covered: 7 essential practices for AWS security</a> appeared first on <a href="https://cloudar.be">Cloudar</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong>In today’s ever-changing threat landscape, cloud security cannot be emphasized enough. Although the AWS platform provides organizations with a dependable, scalable and cost-effective solution for storing and processing sensitive data, organizations must implement their own AWS security best practices as part of the shared responsibility model. Here are seven crucial practices that can help you secure your cloud infrastructure and mitigate the risk of security breaches:</strong></p>
<h2>#1 Develop a comprehensive strategy</h2>
<p>Before deploying your applications on AWS, it is essential to establish a well-defined cybersecurity strategy. This strategy should include conducting a risk assessment, performing threat modelling, and devising a mitigation plan. Identify potential risks and vulnerabilities specific to your cloud infrastructure and implement measures to address them. This will ensure compliance with industry standards and regulations while proactively preventing cyberattacks.</p>
<h2>#2 Become familiar with the AWS Well-Architected Framework</h2>
<p>AWS offers abundant resources to help organizations enhance their security posture. <a href="https://cloudar.be/services-solutions/aws-well-architected-review/">The AWS Well-Architected Framework</a> provides guidance for designing and operating secure and cost-effective systems in the cloud. The Framework encompasses five key pillars: operational excellence, security, reliability, performance efficiency, and cost optimization. Understanding and leveraging the Framework is key to safeguarding applications against potential cyberthreats.</p>
<h2>#3 Implement robust security controls</h2>
<p>Taking proactive measures to impose strong cloud security controls is crucial for organizations to secure their AWS cloud infrastructure effectively. As the responsibility falls on you to protect your cloud workloads, consider implementing security controls to minimize the risk of security breaches, including clearly defining user roles, conducting privilege audits, enforcing a strong password policy, and using multi-factor authentication (MFA). Consistent enforcement and adherence to these security controls throughout your organization are essential.</p>
<h2>#4 Ensure easy access to security policies</h2>
<p>Accessibility to your <a href="https://cloudar.be/category/security-compliance/">AWS security policies</a> is key to promoting a culture of security within your organization. These policies should encompass access control, network security, encryption, and incident response guidelines. Making policies accessible helps everyone in your organization understand the importance of security and act in accordance with your policies.</p>
<h2>#5 Safeguard data with encryption</h2>
<p>Encrypting your data prevents unauthorized access and ensures its confidentiality, even if intercepted or stolen. Encryption is often mandatory for regulatory compliance. AWS provides various encryption options, including server-side encryption, client-side encryption, and transit encryption. Familiarize yourself with these options and choose the appropriate method to secure your sensitive data within your cloud environment.</p>
<h2>#6 Back up data consistently</h2>
<p>Regular data backups ensure data integrity and availability. In the event of cyberattacks, hardware failures, or accidental deletions, having up-to-date backups provides peace of mind and enables data recovery. The frequency of backups should be based on the criticality and volatility of your data. Regulatory requirements and business needs will determine how long the data will be retained. AWS offers various backup options, such as Amazon EBS, Amazon S3, and AWS Backup. By leveraging these options, you can store your backups in multiple regions to ensure constant protection.</p>
<h2>#7 Stay up to date</h2>
<p>AWS regularly releases security patches, bug fixes, and updates to address vulnerabilities and counter new threats. Keeping your AWS systems up to date maintains the security of your environment and protects against potential attacks. Take advantage of AWS’s automatic update features, such as Amazon Inspector and AWS Systems Manager, to automate patching and ensure your systems are always current. Configure notifications to receive alerts about new updates, enabling prompt action to stay ahead of security risks.</p>
<p><strong>Want to optimally prepare your organization for cloud-related security threats? <a href="https://cloudar.be/contact">Get in touch with Cloudar</a>, an official Next Generation AWS Managed Service Provider Partner.</strong></p>
<p>The post <a href="https://cloudar.be/awsblog/get-it-covered-7-essential-practices-for-aws-security/">Get it covered: 7 essential practices for AWS security</a> appeared first on <a href="https://cloudar.be">Cloudar</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Our journey to AWS Certification</title>
		<link>https://cloudar.be/awsblog/our-journey-to-aws-certification/</link>
		
		<dc:creator><![CDATA[Andy Mommerency]]></dc:creator>
		<pubDate>Fri, 22 Oct 2021 12:51:59 +0000</pubDate>
				<category><![CDATA[AWS Blog]]></category>
		<category><![CDATA[Security & Compliance]]></category>
		<guid isPermaLink="false">https://www.cloudar.be/?p=19699</guid>

					<description><![CDATA[<p>When I joined Cloudar five years ago, I was employee number eight. Things were already pretty well-organized with some rules in place, but for the rest the possibilities were wide open. I like to describe it as a “rock ‘n’ roll culture.” Security is job zero Our projects, customer base, headcount and specialties were growing [&#8230;]</p>
<p>The post <a href="https://cloudar.be/awsblog/our-journey-to-aws-certification/">Our journey to AWS Certification</a> appeared first on <a href="https://cloudar.be">Cloudar</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>When I joined Cloudar five years ago, I was employee number eight. Things were already pretty well-organized with some rules in place, but for the rest the possibilities were wide open. I like to describe it as a “rock ‘n’ roll culture.”</p>
<h2><strong>Security is job zero </strong></h2>
<p>Our projects, customer base, headcount and specialties were growing like bamboo. Growth is a good thing, but it comes with some challenges. It was important for us to stay organized and efficient for many reasons, but above all to retain the highest level of information security. Because we’re big believers in, as AWS puts it: “Security is job zero.”</p>
<p>At the time, some customer projects were starting to require Cloudar to get ISO 27001 certified. This international standard for information security involves yearly audits, with a full audit every three years. Obtaining this certificate would also allow us to further expand our business.</p>
<p>It was around the same time that the General Data Protection Regulation (GDPR) came into force, replacing the 90’s Data Protection Directive. And while we were at it, we also wanted to achieve the AWS Managed Services Partner competency to further promote our business.</p>
<p>So we rolled up our sleeves and started working on getting AWS MSP, GDPR and ISO 27001, all at the same time. The goal: comply with all three, ASAP. And we did it! GDPR was done well before the deadline and by the end of 2018, we proudly announced that we had both certifications in the bag.</p>
<h2><strong>How we went about it </strong></h2>
<p>Before we started, we looked at the three different goals and identified the overlaps and dependencies:</p>
<p>For MSP, we structured the work into Jira tasks and created a Kanban overview to track progress. Each requirement referred to a page in Confluence where the content was written for the auditor to review.</p>
<p>For GDPR and ISO 27001, we engaged with InfoSentry, a Cronos company specialized in information security. Their experience and input proved to be very helpful for us to set up a usable Information Security Management System and Privacy Management System.</p>
<p>The following months were packed with writing policies and implementing improvements and procedures. It struck me that in many cases, the things we did and the way we did them were already in line with industry security and compliancy requirements. The whole exercise just confirmed that our way of working is quite secure. At the same time we gained new insight and structure that enable us to build on our strengths.</p>
<h2><strong>Leveraging our experience </strong></h2>
<p>Since we got multi certified, we’ve been leveraging our experience to help some of our customers on their information security journey. Whether you’re seeking insight into your current security status or looking to get ISO 27001 certified, we can help. Today, our company counts over 40 people. We just passed our recertification for ISO 27001. There were no non-conformities, just a single improvement opportunity. This kickass result is in line with our audit results from previous years. Our MSP recertification will follow soon, with even more achievements to come. I think that proves we can keep things organized, secure and fun at the same time. And we still rock!</p>
<p>The post <a href="https://cloudar.be/awsblog/our-journey-to-aws-certification/">Our journey to AWS Certification</a> appeared first on <a href="https://cloudar.be">Cloudar</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Security Hope</title>
		<link>https://cloudar.be/awsblog/security-hope/</link>
		
		<dc:creator><![CDATA[Andy Mommerency]]></dc:creator>
		<pubDate>Mon, 23 Aug 2021 12:18:26 +0000</pubDate>
				<category><![CDATA[Security & Compliance]]></category>
		<category><![CDATA[findings]]></category>
		<category><![CDATA[security hub]]></category>
		<guid isPermaLink="false">https://www.cloudar.be/?p=18996</guid>

					<description><![CDATA[<p>Knowledge is key. And the first step to a secure system is knowing its weaknesses. AWS Security Hub is an excellent diagnostic tool that provides you with a centralized and comprehensive view of your AWS environment’s security posture. Having a centralized tool has many benefits. The most important one? Your team won’t have to cycle [&#8230;]</p>
<p>The post <a href="https://cloudar.be/awsblog/security-hope/">Security Hope</a> appeared first on <a href="https://cloudar.be">Cloudar</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span style="font-weight: 400;">Knowledge is key. And the first step to a secure system is knowing its weaknesses. AWS Security Hub is an excellent diagnostic tool that provides you with a centralized and comprehensive view of your AWS environment’s security posture.</span></p>
<p><span style="font-weight: 400;">Having a centralized tool has many benefits. The most important one? Your team won’t have to cycle through several applications to manage dozens, if not hundreds of security alerts every day. It helps them to keep an overview and they will be less likely to miss anything important. You can even set up automated checks!</span></p>
<p><span style="font-weight: 400;">There are just a few things you need to keep in mind: the AWS Security Hub does not offer multi-region tracking at this time and only supports the following standards:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">CIS AWS Foundations</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">AWS Foundational Security Best Practices</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Payment Card Industry Security Standard</span></li>
</ul>
<p><span style="font-weight: 400;">If these current limitations are not a hang-up and if the AWS Security Hub fits your needs, it is an excellent and easy-to-set-up tool that will help you take control of your cybersecurity.</span></p>
<h2><b>I’m ready to go. Where do I start?</b></h2>
<p><span style="font-weight: 400;">When you start using AWS Security Hub, you will most likely be bombarded with alerts. It can be overwhelming, so a structured approach is essential when starting to tackle these issues. </span></p>
<p><span style="font-weight: 400;">People seem to have a natural desire to annihilate their to-do lists and to reach a score of 100% as soon as possible. And while that may look good, it will impact your judgment if you let it.  </span></p>
<p><span style="font-weight: 400;">Instead, realize how important it is to have all this information neatly centralized in one tool. It’s perfectly fine to score less than 100%, as long as you are aware of all issues and create a timeline in which to tackle them. </span></p>
<p><span style="font-weight: 400;">An example policy could be:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Critical: resolve within 1 month</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">High: resolve within 3 months</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Medium: resolve within 6 months</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Low: resolve within 12 months</span></li>
</ul>
<h2><b>Focus on one standard</b></h2>
<p><span style="font-weight: 400;">It is counter-productive to try and deal with all standards at the same time. Is the PCI standard relevant to your business? No? Then leave it unchecked. </span></p>
<p><span style="font-weight: 400;">Of all the standards you do have enabled in the AWS Security Hub, open the one with the worst score (spoiler alert: this is usually the CIS standard).</span></p>
<p><span style="font-weight: 400;">Once you are satisfied with the standard that requires the most work, you can look into any other standards in need of your attention.</span></p>
<h2><b>First things first</b></h2>
<p><span style="font-weight: 400;">Let’s start at the beginning. When you select the second tab in the app, you will only see “failed” controls. By default, this list is sorted by severity, with the most critical issues on top. </span></p>
<p><span style="font-weight: 400;">Let’s focus on the Critical and High severity findings first. After that, you can work on the Medium and Low findings.</span></p>
<p><span style="font-weight: 400;">To successfully deal with security findings, follow these steps:</span></p>
<ol>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Read and understand what the finding is about. Follow the link to the AWS documentation for more details. Find out how many resources it affects (you will find this in the last column) to get an idea of the size, risk, and work to be done.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Decide on your next action and set the workflow status accordingly:</span>
<ol>
<li style="font-weight: 400;" aria-level="2"><span style="font-weight: 400;">Remediate </span><i><span style="font-weight: 400;">(let me do it)</span></i><i><span style="font-weight: 400;"><br />
</span></i><span style="font-weight: 400;">Each finding description offers a link to documented remediation instructions. Once resolved, the finding will clear automatically after some time. Do you want it gone sooner? Sure thing. You can set the workflow status to “resolved” to clear the view immediately.</span></li>
<li style="font-weight: 400;" aria-level="2"><span style="font-weight: 400;">Notify </span><i><span style="font-weight: 400;">(not my problem)</span></i><i><span style="font-weight: 400;"><br />
</span></i><span style="font-weight: 400;">This workflow status is convenient to keep track of findings that are not your direct responsibility, but are of interest to you. You will still have to hand over the work to the right person, but it’s a nice way to stay in the loop.</span></li>
<li style="font-weight: 400;" aria-level="2"><span style="font-weight: 400;">Suppress </span><i><span style="font-weight: 400;">(shut up)</span></i><i><span style="font-weight: 400;"><br />
</span></i><span style="font-weight: 400;">Don’t overuse this one! Its purpose is to disable a check for a given resource. Be aware that if you ever disable and enable a standard again, the suppressed findings are reset. You should only use suppress when the check really has no added value for your situation.</span><span style="font-weight: 400;"><br />
</span><span style="font-weight: 400;"><br />
</span><span style="font-weight: 400;">You could also completely disable a specific control for all current and future resources. It comes with a text field where you can enter the reason for disabling, which is very interesting for future reference. </span><span style="font-weight: 400;"><br />
</span><span style="font-weight: 400;"><br />
</span><span style="font-weight: 400;">Why would you suppress a finding indefinitely? Here’s an example: if your company follows the CIS level 1 standard and only works with virtual MFA devices, control 1.14 (hardware MFA on root) is not necessary – as long as you do have virtual MFA on your root account. In that case, you can disable control 1.14.</span></li>
</ol>
</li>
</ol>
<h2><b>Time to think ahead </b></h2>
<p><span style="font-weight: 400;">While it’s smart to look at the Critical and High severity findings first, it is possible that there are lower severity findings that pose a higher risk to your specific situation. </span></p>
<p><span style="font-weight: 400;">Rifle through all findings to see if anything stands out. Look for findings that relate to your most critical instances first, for example. Guard Duty detected suspicious behavior? Investigate!</span></p>
<p><span style="font-weight: 400;">Lower severity findings typically come in a high number of similar or related issues. In many cases, these can be remediated with a rather low effort. </span><span style="font-weight: 400;"><br />
</span><span style="font-weight: 400;"><br />
</span><span style="font-weight: 400;">For example, you may receive dozens of findings about password requirements, one for each user. These can all be solved by applying an IAM password policy. MFA can be enforced through policies.</span></p>
<p><span style="font-weight: 400;">A missing CloudWatch configuration is another common cause of findings. You can deploy </span><a href="https://github.com/rewindio/aws-security-hub-CIS-metrics"><span style="font-weight: 400;">this script</span></a><span style="font-weight: 400;"> to configure the necessary metrics and alarms.</span></p>
<h2><b>Last but not least</b></h2>
<p><span style="font-weight: 400;">Once you have everything under control and your score reached a value to be proud of, you’re not done. Security never is.</span></p>
<p><span style="font-weight: 400;">Do you have all relevant standards enabled? Do you get recurring findings? Can you automate things? Did you suppress valid findings? Do you receive new findings each time you deploy new resources? Any 3rd party tools you can integrate with Security Hub?</span></p>
<p><span style="font-weight: 400;">As you can see, you can’t rest on your laurels when it comes to security. While a solid, centralized tool is half the battle, we also need you to stay on your toes. Good luck! </span></p>
<p>The post <a href="https://cloudar.be/awsblog/security-hope/">Security Hope</a> appeared first on <a href="https://cloudar.be">Cloudar</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
