Frequently Asked Questions
Answers to your most commonly asked question
Answers to your most commonly asked question
Cloud Conformity uses a custom access policy to view your AWS account metadata - there is no read or write access to your data.
Cloud Conformity only accesses the metadata associated with your AWS infrastructure. For example, we recognise that your AWS account has twelve S3 buckets and twenty EC2 instances, however, we cannot see the data/applications associated with these resources.
We retain metadata for active accounts for a 12-month period after which it is automatically deleted. If you choose to deactivate an account, all your data is automatically deleted at the time of deactivation.
No, Cloud Conformity staff don’t have access to view your dashboard or account information. Authorised members of our technical team have limited access to view metadata associated with your accounts, for example, the number of compliance checks performed. However, our staff cannot see the specific violations associated with your AWS account.
Cloud Conformity accesses your account via the AWS API and therefore does not increase your AWS bill. Your monthly AWS bill will not increase regardless of how many of your AWS accounts are linked to Cloud Conformity.
Absolutely! Cloud Conformity charges on a month-to-month basis so you aren’t tied in. If at any time you’re unhappy with the service, however, you can cancel your subscription via the Administration section and will then be charged for the remainder of that month.
In a nutshell: Prevention, Detection, Correction. The most complete solution to avoid critical threats and vulnerabilities in your AWS environments. Awarded both AWS Cloud Management Tools Competency and Security Partner Competency, Cloud Conformity’s real-time security, compliance and optimization platform delivers continuous assurance that your infrastructure is secure and compliant as your cloud footprint grows. Our combination of real-time insights and accessible, simple, remediation steps enables organisations to embrace DevOps without the fear of introducing security vulnerabilities, reliability risks or performance and cost inefficiencies.
As organizations are moving more complex and larger workloads into the cloud to take advantage of its agility, flexibility and lower costs, the need for broader and deeper security of your infrastructure has never been greater. Traditional security methods such as firewalls and agent-based protection aren’t ideal in the cloud, a simple change on one EC2 instance could go unnoticed and have a potentially catastrophic impact on your business.
Cloud Conformity gives you back full visibility and control of your infrastructure, whilst ensuring you are committing to the AWS Shared Responsibility Model by securing all the applications in your cloud environments.
Cloud Conformity has been designed so you can be up and running with your own Cloud Conformity account within 5 minutes. Once you have connected and configured one AWS account, replicating the rules and communication preferences across other accounts can be done in a matter of minutes. We’d be more than happy to give a quick demo on this!
Cloud Conformity has its roots in the AWS Well-Architected Framework and uses this to measure compliance levels against your account. The Cloud Conformity rules can also be filtered by various industry standards (GDPR, HIPAA, CIS, & PCI), so you’re able to see and action very quickly the improvements needed to ensure you’re meeting those standards on your AWS infrastructure.
AWS Trusted Advisor is a great starting point to identify best practice violations and cost-saving techniques for your AWS accounts. However, it is limited to only 54 rules and doesn’t provide easy to follow resolution steps to rectify the issues. For your complex workloads on AWS, you will need a comprehensive continuous assurance tool that covers more AWS services. Cloud Conformity has over 400 advanced rules, each providing the rationale and clear remediation steps for the violations. Cloud Conformity also seamlessly integrates with your existing workflow to ensure vulnerabilities are remediated as they occur, by the appropriate individual or team.
If you’re keen to add your own rules, custom rules can be created via AWS Config with the results ingested and displayed in Cloud Conformity. Other custom rule sets can be ingested by Cloud Conformity via the Cloud Conformity API.
If you need additional support creating a new rule, please have a chat with us via the chat bubble at the bottom right of the page (there is always someone online!). We’re constantly adding new rules to our platform, so we might already be working on the rule you’re after.
The AWS Well-Architected Framework defines best practices you should follow to ensure your AWS infrastructure is secure, reliable, highly available and cost-effective. Cloud Conformity automates the auditing of your AWS infrastructure against the Well-Architected Framework.
Cloud Conformity currently integrates with the following communication channels and workflow systems:
Cloud Conformity currently runs over 450 automated best practice rules and we are constantly adding new rules every week, so you can expect to see this number grow!