Infosys offers full potential of cloud ecosystem with Infosys Cobalt to increase business value and speed to market. The automotive company had deployed their workloads in cloud environment (AWS, Azure, Alibaba) which were not fully operational across geos.

Infosys assessed and analyzed their existing cloud security posture and recommended plans to remediate the identified cyber security gaps.

Key Challenges

  • No visibility, compliance and governance, data security for AWS cloud application and container services workloads
  • No mechanism present to conduct runtime monitoring of incidents, compliance violations and vulnerabilities in public cloud
  • No security assurance and central governance in the client’s environment
  • Existing core functioning was not intact with additional global landing zone connection
  • Unable to secure connectivity over the internet for AWS cloud
Line

The Solution

Holistic assessment of cloud security platforms based of Infosys 4D framework

  • Identified cybersecurity gaps and improvements, continuous innovations related to cloud security configurations, policies/guardrails, and architecture
  • Demonstrated phase wise solutions and remediation approach after analysis for the identified gaps. And remediate those gaps for improving cyber resilience
  • Deployed automated security solutions on new global landing zone and integrated with existing cloud set-up for centralized administration
  • Conducted assessment on vulnerability management, asset discovery and threat detection posture on cloud workloads
  • Integrated cloud security logs with enterprise Splunk for centralized security monitoring
Line

Benefits

Round the cloud security monitoring on cloud security related threats and incidents

Reduced cyber-attack surface by defining a phase wise approach to secure the cloud

Reduced cyber-attack surface by defining a phase wise approach to secure the cloud

Enhanced cloud security posture architecture and policies to defend against zero-day attacks

Enhanced cloud security posture architecture and policies to defend against zero-day attacks

Better visibility of security vulnerabilities/gaps around each security area and remediation roadmap

Better visibility of security vulnerabilities/gaps around each security area and remediation roadmap