+
21
services
Years of experience in IT
Migrations from monolithic infrastructure to modern microservices applications
Industries served
This is a paradox, but security is both one of the most important things everyone needs and one of the worst implementations among other aspects every company has. It requires a serious technical background, understanding of the processes, company needs, and up-to-date knowledge of security trends, tools and threats.
At Alpacked we have gathered all of this and proved our expertise in various certifications - SOC2, ISO, FedRAMP, and others.
Defense
Encryption
Access management
Traffic
Processes
Cost
We provide end-to-end solutions of any complexity.
AWS security
- IAM - least privilege paradigm up to the last
- KMS - full at-rest and in-transit encryption, including cross-account kms, limited key access granting and other features
- SecurityHub, Access advisor
- SSM Compliance, Patch Manager - Automated continuous patching, as well as reporting and statistics of the process
- Secrets manager - Integration with databases and other services to guarantee the password/key rotation and secret encryption at-rest
- WAF - OWASP TOP 10, DDoS, Dictionary attacks prevention
Docker security
- Image signing - Use Notary to sign and verify every image you use
- Rootless mode - Do not allow docker daemon to gain root access
- Apparmor/SELinux - Use native RedHat and Debian security features to properly configure docker daemon
- Image optimization - Follow the security best practices - non-root users, multistage builds, read-only binary files
Kubernetes security
- Security context - leverage native K8S functionality to prevent any interference with docker containers - read-only filesystems, privilege escalation, UID/GID lock
- Service Mesh - use Istio, Linkerd, AppMesh and other service mesh providers for automatic encryption in-transit, control over the network connections, JWT authorization, and other features
- Network Policy - Take control over the network to a greater extent. Control interconnections between pods and namespaces, direction of connection and protocol
- OPA - Use Open Policy Agent to control the allowed configuration of any resource (regardless of either it is a CRD or a native resource). Enforce security policies of your companies
SIEM
- ELK, Prometheus+Grafana - Open-source tools for monitoring, alerting, and reporting of security events
- Authentication events logging - reporting and alerting for any successful and unsuccessful authentication events
- Integrity monitoring - reporting and alerting for any modification of a filesystem or cloud configuration
We select top-notch tools to build reliable applications
Quality
Any task completed by our DevOps engineer will pass internal quality control before delivery. That's the rule we never break!
Support 24/7
Our DevOps managers are always ready to answer your questions. You can call us on the weekends and at night. Because we are time zone and culturally aligned.
Experience
ALPACKED - DevOps company that has more than 10 years of IT experience. Certified in many technologies & methodologies.
Great rates
We have special prices for our loyal customers and startups.
Just fill the form below and we will contaсt you via email to arrange a free call to discuss your project and estimates.
Have other questions? Email us!
sales@alpacked.io
Can I develop now and get back to security once we get mature?
Yes and No. It is common to put security aside until a startup gets mature and pays off, which is understandable, since security is not a cheap thing to get, and slows down a development process, since it requires compliance with a lot of standards. However, Alpacked’s recommendation is to worry about security from day one, as it’ll get even more difficult and expensive later on. One of the examples is a control over outgoing connections - it is always easier to block all of them at the beginning and then whitelist them one by one, as the need emerges. Implementing it later on, will require a dev team to collect the URLs, forget about some of them, as it usually happens, and suffer from blocked connections to various 3rd-party integrations (Based on real events at different projects)
Should we actually implement NIST and CIS or are they just for audits?
Yes, you should. Even though some of the NIST requirements related to processes might be too strict, technical standards there were written down by real professionals, and we recommend following them whether you get ready for the audit, or simply try to apply security best practices
What’s SIEM and why do we need it?
SIEM stands for Security information and event management. It usually implies a monitoring, reporting and alerting system for security events, like authentication, authorization, configuration and secrets management, IDP, and IDS
What are the key points of all security audits?
Going through different security audits, we have noticed a list of common requirements all of them have:
What effort does it take to be secure?
It requires a dedicated person or a team (depending on the size of the dev team and company) responsible for processes, technical implementation or technical statement of the problem
Which services should we use to secure our AWS workloads?
Considering the 4 key points of security audits, we recommend to leverage the following services:
Which services can be leveraged to secure kubernetes workloads?
Kubernetes has a large community and therefore a huge list of different security services. We recommend checking them out at CNCF Landscape. However, Alapcked recommends paying attention to Istio, OPA, Notary, Kube-bench, Falco as the main ones
Is it possible for large companies and enterprises to keep security at high level without enterprise-level software?
Yes. CNCF and Kubernetes main participants and donators are large enterprise companies, which invest into opensource technologies to make them more stable and mature, and use them for their own needs. They spend tons of money and time to develop these products, validate and maintain them, making opensource software suitable for any needs. However, unlike the enterprise software, opensource one requires a team of professionals to properly configure the integration with other services, since they usually tend to be different solutions rather than a part of a certain family.
Just fill the form below and we will contaсt you via email to arrange a free call to discuss your project and estimates.