|0 Comment |CyberOne LLC

Continuous monitoring and perimeter security
Designed, implemented, and executed the Continuous monitoring program for the USA’s leading e-commerce company with Peakcock platform.

Challenges:

Cloud-based applications and cloud solutions become the backbone of all industries and development & deployment become easier in the agile world. Securing a multi-cloud environment becomes a critical task for a cyber security organization to ensure data security. Misconfiguration alone caused 110 billion in the latest cyber-attacks, so it is essential to secure the entire cloud environment.

CyberOne Approach

CyberOne utilizes NIST 800-53, Cloud security alliance and FED-RAMP requirements to assess cloud security controls and identified security control weaknesses. Reviewed the security architecture, conducted the risk assessment, and identified the right Cloud security solution with seamless CI/CD pipeline integration along with cyber assurance tasks. Identified the vulnerabilities and worked on remediation support with various stakeholders.

Results and accomplishment  

Successfully deployed Peakcock CyberOne’s Pentest 365 platform which offers best-in-class build & runtime security and continuous monitoring. Fully integrated cloud-native solutions with other critical cyber solutions & processes -SIEM, TVM-Threat and vulnerability management, SecOps, GRC & reporting, and Service Desk platforms.