AWS Infrastructure Vulnerability Scanning Routinely scanning your AWS infrastructure resources for known software vulnerabilities increases the security posture of your organization by identifying and remediating the highest risk vulnerabilities to ensure that your infrastructure remains in line with security best practices.
AWS Resource Inventory Visibility Continuously scan and report on all AWS resources, and their configuration details, updated automatically with newly added or removed resources.
AWS Security Best Practices Monitoring Detect when AWS accounts and the configuration of deployed resources do not align to security best practices.
AWS Compliance Monitoring Compliance scanning improves cloud security governance and compliance posture and provides controls for security standards including CIS AWS Foundations, PCI DSS, HIPAA, HITRUST, ISO 27001, MITRE ATT@CK, AND SOC2.
Moniter, Triage Security Events Intelligent threat detection service operated by security experts continuously monitors your AWS accounts and workloads for malicious activity and delivers detailed security findings for visibility and remediation.
24/7 Incident Alerting and Response 24/7 security intelligence and orchestration services operated by security experts to provide security incident alerting and remediation services automatically routed to DXC PlatformXTM for 24x7 monitoring and remediation.
Distributed Denial of Service (DDoS) Mitigation A system backed by technology and security experts monitoring 24/7 for Distributed Denial of Service (DDoS) attacks against your AWS applications.
Managed Intrusion Prevention System (IPS) Protect your environment from known and emerging network threats that seek to exploit known vulnerabilities.
Managed Detection and Response for AWS Endpoints A combination of technology and cloud security experts working to continuously detect, investigate, and remove threats from within your AWS endpoints.
Managed Web Application Firewall (WAF) A firewall managed service designed to protect web-facing applications and APIs against common exploits.
Additional Security Services Digital Forensics and Investigations (DFI)Threat HuntingWAR: Well Architected Review Service - DXC Professionals audit customer environment to identify and remediate security gaps, design flaws and configuration errors