Professional Documents
Culture Documents
Cloudsecurity Maturity Model Assessment
Cloudsecurity Maturity Model Assessment
Cloudsecurity Maturity Model Assessment
https://maturitymodel.security.aws.dev/en/assessment-to
2.1.1
Phase 2: Security governance
Foundational
2.1.1
Phase 2: Security governance
Foundational
2.2.1
Phase 2: Security assurance
Foundational
2.3.1
Phase 2: Identity & access management
Foundational
2.3.2
Phase 2: Identity & access management
Foundational
2.4.1
Phase 2: Threat detection
Foundational
2.5.1
Phase 2: Vulnerability management
Foundational
2.5.2
Phase 2: Vulnerability management
Foundational
2.6.1
Phase 2: Infrastructure protection
Foundational
2.6.2
Phase 2: Infrastructure protection
Foundational
2.6.3
Phase 2: Infrastructure protection
Foundational
2.7.1
Phase 2: Data protection
Foundational
2.7.2
Phase 2: Data protection
Foundational
2.7.3
Phase 2: Data protection
Foundational
2.8.1
Phase 2: Application security
Foundational
2.8.2
Phase 2: Application security
Foundational
2.9.1
Phase 2: Incident response
Foundational
2.9.2
Phase 2: Incident response
Foundational
3.1.1 Phase 3: Efficient Security governance
Multi-Factor Authentication
Backups
Tagging strategy
Anti-Malware/EDR
Encryption in transit
-- Select an option -- 0%
-- Select an option -- 0%
-- Select an option -- 0%
-- Select an option -- 0%
-- Select an option -- 0%
-- Select an option -- 0%
-- Select an option -- 0%
-- Select an option -- 0%
-- Select an option -- 0%
-- Select an option -- 0%
-- Select an option -- 0%
-- Select an option -- 0%
-- Select an option -- 0%
-- Select an option -- 0%
-- Select an option -- 0%
-- Select an option -- 0%
-- Select an option -- 0%
-- Select an option -- 0%
-- Select an option -- 0%
-- Select an option -- 0%
-- Select an option -- 0%
-- Select an option -- 0%
-- Select an option -- 0%
-- Select an option -- 0%
-- Select an option -- 0%
-- Select an option -- 0%
-- Select an option -- 0%
-- Select an option -- 0%
-- Select an option -- 0%
-- Select an option -- 0%
-- Select an option -- 0%
-- Select an option -- 0%
-- Select an option -- 0%
-- Select an option -- 0%
-- Select an option -- 0%
-- Select an option -- 0%
-- Select an option -- 0%
-- Select an option -- 0%
-- Select an option -- 0%
-- Select an option -- 0%
-- Select an option -- 0%
-- Select an option -- 0%
-- Select an option -- 0%
-- Select an option -- 0%
-- Select an option -- 0%
-- Select an option -- 0%
-- Select an option -- 0%
-- Select an option -- 0%
-- Select an option -- 0%
-- Select an option -- 0%
-- Select an option -- 0%
-- Select an option -- 0%
-- Select an option -- 0%
-- Select an option -- 0%
-- Select an option -- 0%
-- Select an option -- 0%
-- Select an option -- 0%
-- Select an option -- 0%
-- Select an option -- 0%
-- Select an option -- 0%
-- Select an option -- 0%
-- Select an option -- 0%
-- Select an option -- 0%
-- Select an option -- 0%
Comments Owner / Responsible
Phase 1: Quick Wins
Recommendation Status
Assign nce
rnaSecurity contacts 0%
o ve
G
urity Select the region(s)
Sec 0%
nce
A s sura
Automate alignment with best practices
0%
i t y using AWS Security Hub
Se cur
nt
Multi-Factor Authentication 0%
a geme
anRoot and audit it
Avoid using 0%
ce ss M
Ac
& Access and role analysis with IAM
nt it y 0%
Ide Access Analyzer
Threat Detection with Amazon
0%
GuardDuty
Audit API calls with ion CloudTrail
ectAWS 0%
et
at D
Thresecurity findings found by
Remediate
0%
AWS Trusted Advisor
Billing alarms for anomaly detection 0%
t
ge men
a
y Man
e ra bilit
Vuln
ion
ro tect
P
u c ure Security Groups
Limit access tusing 0%
st r
Infra
ty
S e curi
ti on AWS WAF with managed rules 0%
p plica
A
e
s pons
Act on Amazon GuardDuty e
t R findings 0%
nc ide n
I
Act on Amazon GuardDuty findings 0%
Partial Score 0%
Phase 2: Foundational Phase 3: Efficient
Recommendation Status Recommendation
Identify security and regulatory
0%
requirements Perform threat modeling
Cloud security training plan 0%
Partial Score 0%
ficient Phase 4: Optimized
Status Recommendation Status
Forming a Chaos Engineering team (Resilience) 0%
0%
Sharing security work and responsibility 0%
0%
0%
0%
0%
0%
0%
0% DevSecOps 0%
0% 0%
Phase Cloud Ad
Score
Phase 1: Quick Wins 0%
Security 0%
Security 0%
Threat d 0%
Infrastru 0%
Data pro 0%
Applicat 0%
Incident 0%
Identit 0% 0% y 0% n 0% t 0% 0%
rit ti o en se io
n
Phase 2: Foundational 0%
cu
e c e m p on e ct
e ot ot
Security s
n 0% pr na
g es pr
tio a a n tr e
Security a 0% at m de ur
p lic D ss ci u ct
e n r
Threat d Ap 0% c I
as
t Se
ac fr
Vulnerab 0% & In
y
Infrastru 0% n tit
e
Data pro 0% Id
Applicat 0%
Incident 0%
Total Result
Identit 0%
Phase 3: Efficient 0%
Security 0%
Security 0%
Threat d 0%
Vulnerab 0%
Infrastru Phase 0% 4: Optimized
Data pro 0%
Applicat 0%
Incident 0%
Identit 0%
Phase 4: Optimized 0%
Security 0%
Threat d 0%
Infrastru 0%
Applicat 0%
Phase 3: Efficient
Incident 0%
Identit 0%
Total Result 0%
Phase Score
Phase 1: Quick Wins 0%
Phase 2: Foundational 0%
Phase 3: Efficient 0%
Phase 4: Optimized 0%
Total Result 0%
% 0% 0% 0% 0% 0% t
0% 0% t
se n
tio ce ce n
ti o en ul
po
n
ec ra
n
na
n
ec em es
s ot u r et g l R 0% s 0% l
re pr ss v e d a ta in na
nt a go at an To W io
e re rit
y re m ck at
id ct
u ity Th ty ui nd
c ru cu ur li
In st Se ec bi :Q ou
fra S er
a
e
1
2 :F a s
In ln as se Ph
Vu Ph a
Ph