Amazon Web Services
Security Assessment
Cloud with Lock


As companies continue to move to the Amazon Web Services (AWS) cloud-based environment, the need for effectively controlling security will only increase.

Within the AWS shared responsibility model, Amazon declares it responsibilities of the overall architecture and servers hosting your data, while relying on you, the customer, to effectively configure security and compliance within the cloud environment you are allotted. Whether you are using S3, EC2, Lambda, Glacier, SNS, CloudFront, Kinesis or other components of the AWS service suite, it is the customer responsibility to securely configure the application. Amazon indicates that customers are responsible for:

  • Platform, Applications and Identity & Access Management
  • Operating System, Network and Firewall configurations
  • Client and Server-side Data Encryption Settings
  • Network Traffic Protection

The Schneider Downs cybersecurity practice can help your organization in ensuring that you have appropriately performed your responsibilities as part of the shared responsibility model to enforce security of your data. We can assess your environment against best practice configurations and security configurations to ensure that the environment appropriately takes into account cybersecurity best practices such as identity and access management, secure configurations, logging, monitoring and networking.  Our approach can be tailored to the specific applications your environment utilizes within AWS.

Using our practical knowledge and experience, we evaluate the current processes and controls to identify potential gaps in the environment as it relates to cloud security. Following the data collection and analysis, our team works with management to determine solutions for identified gaps and develop a prioritized road map in place to achieve an acceptable level of risk mitigation. In addition, our audit and report will make reference to best practices called out by reputable organizations such as the Center for Information Security and Amazons’ own best practices.

View our additional Cybersecurity services and capabilities

Amazon Web Services, the “Powered by AWS” logo, [and name any other AWS Marks used in such materials]  are trademarks of, Inc. or its affiliates in the United States and/or other countries.

Cybersecurity Resources

Resource Library

Explore our cybersecurity resource library, including case studies, whitepapers, best practices and expert thought leadership.

Learn More >

Our Thoughts On

Schneider Downs’ experts deliver analysis about the cybersecurity trends that impact our clients and organizations of all types and sizes.

Learn More >

contact us