AWS
Overview
Vanta integrates with 40+ AWS resources to provide real-time continuous monitoring and automated evidence collection for 35+ common security and privacy frameworks. With support for key resources like Amazon EC2, Amazon EKS and AWS Lambda Functions, and key services like CodeCommit and Amazon Inspector, you can gather deep evidence of compliance and ensure your AWS environments are always secure.
Top capabilities
Quickly get and stay compliant with tests that continuously monitor AWS infrastructure and enable you to:
- Track and manage AWS user access
- Centralize visibility across many resource types, including storage, compute, and networking
- Ingest vulnerabilities from AWS Inspector and continuously monitor adherence to SLAs
- Track change management compliance from CodeCommit
- Implement key security best practices with support for the CIS Benchmark for Amazon EKS and CIS AWS Foundations Benchmark
AWS Access Analyzer
AWS Autoscaling Group
AWS Certificate
AWS CloudTrail
AWS CloudWatch Log Group
AWS CloudWatch Metric Alarm
AWS CodeCommit Repo
AWS Config Recorder
AWS Credential Report
AWS DocumentDB Cluster
AWS DynamoDB Table
AWS EBS Volume
AWS EC2 Instance
AWS ECR Container Repository
AWS ECR Container Vulnerability
AWS ECS Cluster
AWS ECS Service
AWS ECS Standalone Task
AWS EFS File System
AWS EKS Cluster
AWS EKS Node
AWS Flow Log
AWS Group
AWS Guard Duty Detector
AWS IAM Identity Center User
AWS IAM Policy
AWS IAM User
AWS Inspector Vulnerability
AWS KMS Key
AWS Lambda Function
AWS Load Balancer
AWS Network ACL
AWS Organization Account
AWS Password Policy
AWS RDS Instance
AWS Redshift Cluster
AWS Role
AWS Route Table
AWS S3 Bucket
AWS Security Group
AWS Security Hub
AWS SQS Queue
AWS Subnet
AWS VPC
Vanta provides 100+ pre-built automated tests for AWS, and supports the ability to create custom tests to monitor any supported AWS resource(s) as well. Here are a few examples of Vanta’s AWS tests:
- AWS accounts deprovisioned when personnel leave
- Critical vulnerabilities identified in packages are addressed (AWS Inspector)
- Kubernetes nodes follow a certificate rotation policy
- No root user access keys exist (AWS)
- Public SSH denied (AWS)