AWS Security Assessment

An AWS (Amazon Web Services) audit is a review of an organization's usage and configuration of AWS resources in order to ensure compliance with industry standards, best practices, and the organization's own policies.

Identity and access management (IAM) policies and user permissions
• Network security and firewall rules
• Encryption of data at rest and in transit
• Monitoring and logging
• Incident response and disaster recovery procedures
• Compliance with regulatory requirements



ESC

LET'S AUDIT

We're committed to your privacy. Puffin Security uses the information you provide to us to contact you about our relevant content, products, and services. You may unsubscribe from these communications at any time. For more information, check out our Privacy Policy.

Why Puffin for your security

5165920

COMMITMENT
TO RESULTS

We use methodologies that ensure the quality policy (ISO 9001) and the achievement of an optimal compromise, prioritizing to response time and speed of execution.

5539821

EFFECTIVENESS + EFFICIENCY

Your company can reduce costs with our bespoken and tailored Approach. We adapt test and rules of engagement to uncover unique vulnerabilities. offering services with flexibility and adequate prices

5250715

EXPERT
EXECUTION

Performed by elite security testing consultants on-site or remote. We accredit experience in complex organizations in security projects, providing knowledge in the triple aspect: organizational, legal and technical.

7150031

PROACTIVE
SECURITY

Prevent better, prioritizing based on risk. A multilayered review defenses of management, risk management and internal audit to ensure that cyber security controls are well designed to protect the information assets and are operating effectively.

+15
____

Years
auditing
companies

100.428
____

Data
breaches
prevented

12
____

 Countries
we have
worked at

538
____

 Companies
we have
worked with

What our clients say...

After some experiences I already knew that having a secure code is the basis to avoid attacks through our applications. With Puffin everything is simple, we got in touch with them and we told them our problems. They quickly got down to work, made an offer that suited our needs and started working. After the tests, our engineers were able to correct a few critical vulnerabilities that without the help of puffin would have been impossible to discover.

CIO INTERNATIONAL COMPANY