BlogSecurity
January 11, 2024

How to protect your physical infrastructure with AWS and Vanta

Written by
Matt Cooper
Privacy, Risk & Commpliance
Reviewed by
No items found.

Accelerating security solutions for small businesses 

Tagore offers strategic services to small businesses. 

A partnership that can scale 

Tagore prioritized finding a managed compliance partner with an established product, dedicated support team, and rapid release rate.

Standing out from competitors

Tagore's partnership with Vanta enhances its strategic focus and deepens client value, creating differentiation in a competitive market.

This blog is part of a series about how to use Vanta and AWS to simplify your organization’s cloud security. To learn more about how to use Vanta and AWS, watch our Coffee and Compliance on-demand webinar.

Amazon Web Services, or AWS, is one of the most popular cloud providers for organizations today — providing one of the most flexible and secure cloud environments available. When it comes to security, AWS has what’s called a Shared Responsibility Model meaning that AWS handles the security of the cloud itself while its customers are responsible for securing what they deploy to their cloud environment. 

In this model, AWS secures the physical infrastructure, the facilities, computing, and the building blocks while customers must secure the workloads and applications that they deploy to the cloud. This is where the AWS integration with Vanta makes a huge difference in how you secure and manage your cloud deployments. 

In this blog series, we’ll show you how to use Vanta to secure the portions of your cloud environment that AWS customers are responsible for. In this blog, we’ll cover physical and environmental infrastructure, explaining what AWS does to protect the cloud data centers that store your data and what other aspects of physical security you’re responsible for that Vanta can help with. 

How AWS protects your physical infrastructure

AWS does the heavy-lifting when it comes to protecting the physical infrastructure of your cloud. With a cloud provider, customers essentially rent the virtual space and infrastructure within a region or availability zone, behind which are the physical data centers. In this model, customers inherit the full suite of security measures which they can leverage for their own security compliance. This reduces the investment and provides your business with flexible options for usage, resources, availability, and redundancy.

AWS employs the same security isolations that are employed in traditional data centers for each regional data center around the world, providing more security policing and countermeasures than almost any large company could afford themselves. 

Here are some of the security measures AWS has in place to protect its infrastructure:  

  • Access to data centers is on a need-to-know basis and is regularly reviewed
  • Security guards and CCTV on site
  • Multi-factor authentication for access to buildings
  • Intrusion detection systems, access log monitoring, and alarms
  • 24/7 monitoring, triage, and incident response 
  • Separations of networks and isolation of hardware and storage
  • Environmental monitoring 

AWS has achieved and maintained several industry-recognized frameworks, such as SOC 1, SOC 2, and SOC 3. AWS makes its compliance reports regularly available through the AWS Artifact console. You can also request a third-party audit if needed.

{{cta_withimage10="/cta-modules"}}

What aspects of physical security are you responsible for? 

While AWS customers inherit a lot of protections from AWS, there are still some aspects of physical security that you’re responsible for, such as:

  • Securing offices and other facilities: Put protections in place to limit access to your office spaces or other facilities that house your data, devices, or systems. 
  • Protecting your devices: Any compromised device connected to your network could result in a data breach. Implement measures, like device encryption, timeout, multi-factor authentication and strong passwords, to protect your devices from unauthorized access. 
  • Remote work security: The organization should consider the physical working conditions of any remote workers and ensure that physical threats to those workspaces are considered and managed. Relevant controls may include, technical monitoring and endpoint controls, rules and policies, spot checks and audits of remote networks, and training for staff.
  • Managing vendor risk: As part of the compliance process for many frameworks, you need to do your due diligence on third-party vendors. You’ll need to show your auditor that you have a process for evaluating AWS in addition to the other lesser-known vendors you use.

How Vanta can help you protect your physical infrastructure

For the areas that are your responsibility, Vanta can help you easily protect these aspects of your infrastructure. Vanta can help you establish policies for your physical spaces, device, and vendor risk management. The platform scans your infrastructure to identify the security gaps you need to address and run tests for physical security outside of the data center. Vanta’s Vendor Risk Management solution lets you automate vendor discovery, risk assessment, and remediation so you can streamline vendor reviews. 

In addition to helping with these areas, Vanta integrates with various AWS products to help you automate security. Some of these areas include:

  • Identity and access management
  • Vulnerability assessment
  • Continuous monitoring of the environment
  • Remediation alerts
  • Compliance reports for common standards

To learn more about how to use Vanta and AWS, watch our Coffee and Compliance webinar recording.

{{cta_withimage6="/cta-modules"}}

Access Review Stage Content / Functionality
Across all stages
  • Easily create and save a new access review at a point in time
  • View detailed audit evidence of historical access reviews
Setup access review procedures
  • Define a global access review procedure that stakeholders can follow, ensuring consistency and mitigation of human error in reviews
  • Set your access review frequency (monthly, quarterly, etc.) and working period/deadlines
Consolidate account access data from systems
  • Integrate systems using dozens of pre-built integrations, or “connectors”. System account and HRIS data is pulled into Vanta.
  • Upcoming integrations include Zoom and Intercom (account access), and Personio (HRIS)
  • Upload access files from non-integrated systems
  • View and select systems in-scope for the review
Review, approve, and deny user access
  • Select the appropriate systems reviewer and due date
  • Get automatic notifications and reminders to systems reviewer of deadlines
  • Automatic flagging of “risky” employee accounts that have been terminated or switched departments
  • Intuitive interface to see all accounts with access, account accept/deny buttons, and notes section
  • Track progress of individual systems access reviews and see accounts that need to be removed or have access modified
  • Bulk sort, filter, and alter accounts based on account roles and employee title
Assign remediation tasks to system owners
  • Built-in remediation workflow for reviewers to request access changes and for admin to view and manage requests
  • Optional task tracker integration to create tickets for any access changes and provide visibility to the status of tickets and remediation
Verify changes to access
  • Focused view of accounts flagged for access changes for easy tracking and management
  • Automated evidence of remediation completion displayed for integrated systems
  • Manual evidence of remediation can be uploaded for non-integrated systems
Report and re-evaluate results
  • Auditor can log into Vanta to see history of all completed access reviews
  • Internals can see status of reviews in progress and also historical review detail
FEATURED VANTA RESOURCE

The ultimate guide to scaling your compliance program

Learn how to scale, manage, and optimize alongside your business goals.