In the Spotlight
Detect internal and external threats to AWS infrastructure
McAfee detects compromised account activity in AWS based on brute force login attempts, logins from new and untrusted locations for a specific user, and consecutive login attempts from two locations in a time period that implies impossible travel – even if the two logins occur across multiple cloud services – to support immediate remediation and limit exposure.
Insider and Privileged User Threats
McAfee automatically constructs a behavior model with dynamic and continuously updated thresholds for each user and group to identify activity indicative of insider threat. Privileged User Analytics identifies risk from inactive administrator accounts, excessive permissions, and unwarranted escalation of privileges and user provisioning.
Audit Identity and Access Management (IAM) permissions
McAfee audits the Identity and Access Management (IAM) permissions assigned to users and inherited from group membership, highlighting inactive user accounts that can be deleted to reduce the attack surface. IAM Group Analytics discovers groups without active members that can be deleted.
Audit AWS security and compliance configuration with cloud security posture management (CSPM)
McAfee continuously monitors and audits AWS security configuration settings to ensure compliance with external regulations and internal policies. McAfee uses field-tested industry best practices to suggest modifications to configuration settings to tighten security and ensure compliance.
Standardize on a corporate AWS account
McAfee identifies all AWS accounts in use by employees and enables enterprises to standardize on their corporate AWS account. Using McAfee, you can enforce governance controls and coach users to corporate AWS accounts for centralized visibility and policy enforcement.