Comprehensive AWS Security Assessment for an NPO focused on Parkinson’s Disease

Comprehensive AWS Security Assessment for an NPO focused on Parkinson’s Disease

ORGANIZATION

Tgix’s client is a non-profit organization that is dedicated to finding a cure for Parkinson’s disease through an aggressively funded research agenda and to ensuring the development of improved therapies for those living with Parkinson’s today.

CHALLENGE

The organization needed to ensure that the AWS environment which housed the core data and applications was secure, compliant, and resilient. Given the sensitive nature of the participant’s PHI data and regulatory compliance requirements, the organization aimed to identify and remediate any vulnerabilities in the cloud infrastructure and applications to protect their data assets and maintain a robust security posture.

SOLUTION

The security assessment involved a comprehensive review of the organization’s AWS environment, including production, non-production, and shared services accounts. Interviews were conducted with stakeholders and key IT staff to gather insights along with reviews of various documents and runbooks that were maintained. This was followed by a detailed examination of the infrastructure, both manually and utilizing automated tools to collect and process information pertaining to the AWS accounts and resources in order to validate configurations and identify potential issues.

Tgix’s security team performed the following activities:

  • Evaluated the systems and network components, ensuring that they followed usage and configuration best practices, e.g. with up-to-date AMIs, well-managed route tables, and separate NAT Gateways for each AZ.
  • Assessed IAM policies to ensure appropriate access controls.
  • Ensured encryption standards for data at rest and in motion using AWS Key Management Service (KMS).
  • Reviewed the use of AWS CloudWatch, CloudTrail, and Config for logging and monitoring.
  • Conducted internal scans to identify potential vulnerabilities within the AWS environment. This included checking for outdated software, misconfigurations, and other security weaknesses.
  • Performed external penetration testing to simulate real-world attacks and identify vulnerabilities that could be exploited by external threats.
  • Assessed the application architecture and data flows to ensure sensitive participant data (PII) was properly isolated and protected.
  • Evaluated the use of DevSecOps practices, including the integration of security scanning tools in CI/CD pipelines and AWS Secrets Manager for managing sensitive information.
  • Reviewed existing backup and DR strategies to identify gaps.
  • Assessed IT operational procedures, including logging, monitoring, alerting, and system updates.
  •  

RESULTS

The detailed activities ensured a thorough assessment of the organization’s AWS environment, identifying critical issues and providing actionable recommendations to enhance security, compliance, and operational efficiency. A timeline for the remediation effort was put together and shared with the IT team.

Issues that needed immediate attention included implementation of WAF and other advanced security controls, upgrading of AMIs and configuring of robust DR processes. Security training for staff was pointed out as vital for maintaining a robust security posture. The various best practices in the environment were also pointed out, such as the use of infrastructure as code, consistent tagging practices, and up-to-date documentation.

Technologies Used

VPC (Network)

EC2 (Compute)

ECS (Containerization)

Lambda (Serverless Compute)

API Gateways (App Delivery),

PostgreSQL RDS (Database),

ALB (Load Balancers),

S3 (Storage),

Route 53 (DNS)

AWS KMS (Key Management)

CloudFront (CDN)

AWS Secrets Manager

AWS CloudWatch, CloudTrail, and Config

If you’re dealing with complex infrastructure, security requirements, deployment speeds, or looking for cost efficiencies, contact us today for a no-obligation brainstorm.

Contact us today!