Back to Template Catalog

Cloud Security Posture Assessment

10 Categories150 Questions

In-depth review of your AWS environment for misconfigurations, open S3 buckets, IAM weaknesses, missing encryption, and other security risks across 10 core areas with over 150 checkpoints.

Categories

1
IAM & Access Control

Comprehensive assessment of Identity and Access Management configuration, policies, roles, MFA enforcement, and federation mechanisms.

2
S3 & Object Storage Security

Assessment of S3 bucket security against unauthorized access, data loss, and misconfigurations including encryption, access controls, and data classification.

3
Network Security & Segmentation

Assessment of VPC architecture, security groups, network ACLs, firewalls, and network segmentation for protection against unauthorized network access and lateral movement.

4
Data Encryption & Key Management

Assessment of the encryption strategy for data at rest and in transit, KMS configuration and key policies, certificate management via ACM, as well as secrets management and secret rotation.

5
Logging, Monitoring & Threat Detection

Assessment of logging, monitoring, and threat detection capabilities including CloudTrail, GuardDuty, Security Hub, AWS Config, centralized log management, and automated threat detection.

6
Compute & Workload Security

Assessment of the security of EC2 instances, Lambda functions, ECS/EKS containers, patch management, runtime security, and AMI hardening.

7
Database & Data Security

Assessment of the security configuration of database services such as RDS, DynamoDB, Redshift, and ElastiCache regarding access control, encryption, backup strategies, and data protection measures.

8
Compliance & Governance

Assessment of regulatory compliance, audit readiness, organizational policies, tag management, and cost governance in the AWS environment.

9
Incident Response & Forensics

Assessment of incident response plans, forensic readiness, automation of response measures, communication structures, and recovery capabilities.

10
CI/CD & Supply Chain Security

Assessment of pipeline security, image scanning, dependency management, SBOM generation, code signing, and artifact security across the entire software supply chain.

Ready to get started?

Sign up for free and claim templates with one click.

Sign up for free
PriceFree
Versionv1.0
Created byGeek Cell GmbH

Yours to keep forever

AWS
Cloud Security
Compliance
CSPM
DevSecOps
Encryption
Governance
IAM
Incident Response
S3