{"id":53261,"date":"2025-01-24T18:18:42","date_gmt":"2025-01-25T02:18:42","guid":{"rendered":"https:\/\/www.sumologic.com\/integration\/sumo-logic-cloud-infrastructure-security-fuer-aws"},"modified":"2026-01-02T08:41:00","modified_gmt":"2026-01-02T16:41:00","slug":"cis-for-aws","status":"publish","type":"integration","link":"https:\/\/www.sumologic.com\/de\/app-catalog\/cis-for-aws","title":{"rendered":"Sumo Logic Cloud Infrastructure Security f\u00fcr AWS"},"content":{"rendered":"\n<section class=\"e-stn e-stn-04971e5cbc928e92181d738037937e13331b4ca7 e-stn--dynamic-grid-section e-mt-0 e-mb-0\"><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row justify-content-center\">\n<div class=\"wp-block-b3rg-column e-col e-col-23c491b9590ceaa0fec0c4d0a346887f5f358584  col-sm-7\">\n<h2 class=\"wp-block-heading has-text-align-center has-gunmetal-color has-text-color has-link-color wp-elements-a2721abb515e52e7736bcfb5bcb85ae5\" id=\"monitor-cloud-security-posture-cloud-configurations-and-manage-cloud-risk-in-your-aws-environment-with-ease-thanks-to-unified-visibility\">\u00dcberwachen Sie die Cloud-Sicherheitslage, die Cloud-Konfigurationen und verwalten Sie Cloud-Risiken in Ihrer AWS-Umgebung dank einheitlicher Sichtbarkeit<\/h2>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-row e-row row e-row--dlt\">\n<div class=\"wp-block-b3rg-column e-col e-col-fb16d19c19a5d501f2ddbce9412fd9f46af6fdf6  col-sm-4\">\n<div class=\"e-div e-div-431e405250f2ce8249058d3c4dd9ba0fc1b25722\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"60\" height=\"50\" src=\"http:\/\/www.sumologic.com\/wp-content\/uploads\/icon-AppObservability.svg\" alt=\"\" class=\"wp-image-3846\" style=\"aspect-ratio:1;width:63px\" title=\"\"><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading\" id=\"bringing-all-your-aws-security-into-view\">Die gesamte AWS-Sicherheit auf einen Blick<\/h3>\n\n\n\n<p>Erfassen, konsolidieren und visualisieren Sie Logs aus diversen AWS-Sicherheitsdiensten, -Konten und -Regionen automatisch. Profitieren Sie von sofort einsatzbereiten Sicherheitsrichtlinienpr\u00fcfungen, um Sicherheitskontrollfehler z\u00fcgig zu identifizieren. Vereinheitlichen Sie Sicherheitsprotokolldaten f\u00fcr umfassende Transparenz und eine einheitliche, verl\u00e4ssliche Datenquelle und automatisierte Abhilfe-Playbooks, um die MTTR zu beschleunigen.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-fb16d19c19a5d501f2ddbce9412fd9f46af6fdf6  col-sm-4\">\n<div class=\"e-div e-div-431e405250f2ce8249058d3c4dd9ba0fc1b25722\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"64\" height=\"64\" src=\"http:\/\/www.sumologic.com\/wp-content\/uploads\/icon-InfrastructureMonitoring.svg\" alt=\"\" class=\"wp-image-3847\" style=\"aspect-ratio:1;width:63px\" title=\"\"><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading\" id=\"cloud-native-configuration-monitoring\">Cloud-native Konfigurations\u00fcberwachung<\/h3>\n\n\n\n<p>Vorgefertigte Sicherheitsinhaltswarnungen zu AWS-Konfigurationsfehlern und Echtzeit-Dashboards helfen Benutzern, Fehlkonfigurationen schnell zu erkennen und zu korrigieren. Die Sicherheitsrichtlinienpr\u00fcfungen von AWS Security Hub tragen zur Einhaltung geeigneter Sicherheitsstandards bei (z.\u202fB. bei verd\u00e4chtigen Konfigurationsaktivit\u00e4ten) und bieten eine zentrale Plattform, die Sicherheitsereignisse zusammenf\u00fchrt. Dadurch wird eine z\u00fcgige Behebung durch traditionell getrennte Teams erleichtert, wobei ein reibungsloser Wechsel von Sicherheitsanalysen zu Logs f\u00fcr Monitoring und Troubleshooting erm\u00f6glicht wird.  <\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-fb16d19c19a5d501f2ddbce9412fd9f46af6fdf6  col-sm-4\">\n<div class=\"e-div e-div-431e405250f2ce8249058d3c4dd9ba0fc1b25722\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-thumbnail is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"62\" height=\"63\" src=\"http:\/\/www.sumologic.com\/wp-content\/uploads\/icon-SIEM.svg\" alt=\"\" class=\"wp-image-3848\" style=\"aspect-ratio:1;width:63px\" title=\"\"><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading\" id=\"one-platform-for-effective-risk-management\">Eine Plattform f\u00fcr effektives Risikomanagement<\/h3>\n\n\n\n<p>Die Bereitstellung erfolgt \u00fcber eine AWS CloudFormation-Vorlage und ist in 30 Minuten einsatzbereit. KI-gesteuerte Anomalieerkennung zeigt Cloud-Risiken auf und macht es einfach, potenzielle Probleme zu identifizieren und zu priorisieren. Normalisieren Sie Daten \u00fcber verschiedene Quellen hinweg, um schnell zwischen AWS-Sicherheitsdiensten wechseln zu k\u00f6nnen, und optimieren Sie die DevSecOps-Zusammenarbeit und Abhilfema\u00dfnahmen mit einer einzigen Cloud-nativen Plattform.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n<section class=\"e-stn e-stn-7c38f1bb1226b513cc2c340296a83248f1c6f7a8 e-stn--repeatable-content-cards e-mt-0 e-pt-30 e-mb-0 e-pb-30\"><style>@media only screen and (max-width: 9999px) {\n\t\t\t\t\t\t\t\t\t.e-stn.e-stn-7c38f1bb1226b513cc2c340296a83248f1c6f7a8 { \n\t\t\t\t\t\t\t\t\t\tbackground-color: #f8f8f8; \n\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t}<\/style><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-30cf6e0d31fd8780616c8617a3382c2b2c7f4e3b e-col--content-wrapper  col-sm-12 col-lg-6\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1492\" height=\"901\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-ClS_Brand.png\" alt=\"\" class=\"wp-image-3849\" title=\"\" srcset=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-ClS_Brand.png 1492w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-ClS_Brand-300x181.png 300w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-ClS_Brand-1024x618.png 1024w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-ClS_Brand-768x464.png 768w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-ClS_Brand-575x347.png 575w\" sizes=\"auto, (max-width: 1492px) 100vw, 1492px\" \/><\/figure>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-30cf6e0d31fd8780616c8617a3382c2b2c7f4e3b e-col--content-wrapper  col-sm-12 col-lg-6\">\n<h2 class=\"wp-block-heading\" id=\"begin-securing-your-aws-environment-in-one-click\">Sichern Sie Ihre AWS-Umgebung mit nur einem Klick<\/h2>\n\n\n\n<p>Cloud Infrastructure Security f\u00fcr AWS bietet einen besseren Einblick in Cloud-Risiken \u00fcber eine einheitliche Ansicht Ihrer AWS-Infrastruktur. Unsere Kunden k\u00f6nnen mit einem Klick loslegen und dank des automatisierten Onboardings in weniger als 30 Minuten bereitstellen. KI-gesteuerte Anomalieerkennung und automatisierte Abhilfe-Playbooks verk\u00fcrzen die Reaktionszeiten und begrenzen menschliche Fehler.<\/p>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n<section class=\"e-stn e-stn-9ba64c108fcbde5b30e83141be4660222d378972 e-stn--repeatable-content-cards e-mt-0 e-pt-30 e-mb-0 e-pb-30\"><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-15df7f642de35e557df618afb20d16d065041e70 e-col--media-wrapper  col-sm-12 col-lg-6\">\n<h2 class=\"wp-block-heading\" id=\"centralize-normalize-analyze-and-alert-on-aws-security-log-data\">AWS-Sicherheitsprotokolldaten zentralisieren, normalisieren, analysieren und bei Bedarf Alarm schlagen<\/h2>\n\n\n\n<p>Durch die Zentralisierung, Normalisierung und Analyse von Daten \u00fcber die wichtigsten AWS-Sicherheitsservices hinweg \u00fcberbr\u00fcckt CIS die L\u00fccke zwischen Sicherheits-, Entwicklungs-, Betriebs- und Zuverl\u00e4ssigkeitsmanagement-Teams und bietet die notwendige Transparenz in ihrer AWS-Umgebung, um die Cloud-Sicherheitslage einfach zu \u00fcberwachen, AWS-Konfigurationsfehler aufzudecken und Cloud-Risiken zu verwalten.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-30cf6e0d31fd8780616c8617a3382c2b2c7f4e3b e-col--content-wrapper  col-sm-12 col-lg-6\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1496\" height=\"901\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-CIS_AWS_Brand.png\" alt=\"\" class=\"wp-image-3850\" title=\"\" srcset=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-CIS_AWS_Brand.png 1496w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-CIS_AWS_Brand-300x181.png 300w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-CIS_AWS_Brand-1024x617.png 1024w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-CIS_AWS_Brand-768x463.png 768w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-CIS_AWS_Brand-575x346.png 575w\" sizes=\"auto, (max-width: 1496px) 100vw, 1496px\" \/><\/figure>\n<\/div><\/div>\n<\/div>\n<\/div><\/section>\n\n<section class=\"e-stn e-stn-7c38f1bb1226b513cc2c340296a83248f1c6f7a8 e-stn--repeatable-content-cards e-mt-0 e-pt-30 e-mb-0 e-pb-30\"><style>@media only screen and (max-width: 9999px) {\n\t\t\t\t\t\t\t\t\t.e-stn.e-stn-7c38f1bb1226b513cc2c340296a83248f1c6f7a8 { \n\t\t\t\t\t\t\t\t\t\tbackground-color: #f8f8f8; \n\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t}<\/style><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-30cf6e0d31fd8780616c8617a3382c2b2c7f4e3b e-col--content-wrapper  col-sm-12 col-lg-6\">\n<div id=\"wistia-block_9de970985a40a4cea11f1e6d545f77c6\" class=\"wistia-video-block\" data-wistia-video=\"wistia_teoeeglf22\">\n\n    <script src=\"https:\/\/fast.wistia.com\/player.js\" async><\/script>\n    <script src=\"https:\/\/fast.wistia.com\/embed\/teoeeglf22.js\" async type=\"module\"><\/script>\n\n    <style>\n        wistia-player[media-id='teoeeglf22']:not(:defined) {\n            background: center \/ contain no-repeat url('https:\/\/fast.wistia.com\/embed\/medias\/teoeeglf22\/swatch');\n            display: block;\n            filter: blur(5px);\n            padding-top: 56.25%;\n        }\n    <\/style>\n\n    <wistia-player\n        media-id=\"teoeeglf22\"\n        aspect=\"1.7777777777777777\">\n    <\/wistia-player>\n\n<\/div>\n\n<style>\n    div[data-wistia-video=\"wistia_teoeeglf22\"] {\n        position: relative;\n        width: 100%;\n        padding-top: 56.25%;\n        background: center \/ cover no-repeat url('https:\/\/fast.wistia.com\/embed\/medias\/teoeeglf22\/swatch');\n    }\n\n    div[data-wistia-video=\"wistia_teoeeglf22\"] wistia-player {\n        position: absolute;\n        top: 0;\n        left: 0;\n        width: 100%;\n        height: 100%;\n        filter: none;\n    }\n<\/style>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-30cf6e0d31fd8780616c8617a3382c2b2c7f4e3b e-col--content-wrapper  col-sm-12 col-lg-6\">\n<h2 class=\"wp-block-heading\" id=\"begin-securing-your-aws-environment-in-one-click\">Mikro-Lektion: Cloud Infrastructure Security f\u00fcr AWS<\/h2>\n\n\n\n<p>Erfahren Sie mehr \u00fcber Cloud Infrastructure Security f\u00fcr AWS von Sumo Logic, eine effektive Methode zur \u00dcberwachung der Sicherheitslage und verd\u00e4chtiger Aktivit\u00e4ten in Ihrer gesamten AWS-Umgebung.<\/p>\n<\/div>\n<\/div>\n<\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":4,"featured_media":29547,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":0,"learn_more_label":"","image_alt_text":"","learn_more_type":"","show_popup":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","place_holder_image_url":"","post_reading_time":"2","notification_enabled":false,"notification_text":"","notification_logo":"","notification_expiration_time":0,"is_enable_transparent_header":false,"selected_taxonomy_terms":{"integration-cloud-provider":[272],"integration-use-case":[267],"translation_priority":[221]},"selected_primary_terms":[],"learn_more_link":[],"featured_page_list":[],"notification_enabled_post_list":[],"_gspb_post_css":"","_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"54001,54012,54020","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"integration-cloud-provider":[272],"integration-use-case":[267],"class_list":["post-53261","integration","type-integration","status-publish","has-post-thumbnail","hentry","integration-cloud-provider-amazon-web-services","integration-use-case-security"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/integration\/53261","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/integration"}],"about":[{"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/types\/integration"}],"author":[{"embeddable":true,"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/users\/4"}],"version-history":[{"count":3,"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/integration\/53261\/revisions"}],"predecessor-version":[{"id":64450,"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/integration\/53261\/revisions\/64450"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/media\/29547"}],"wp:attachment":[{"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/media?parent=53261"}],"wp:term":[{"taxonomy":"integration-cloud-provider","embeddable":true,"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/integration-cloud-provider?post=53261"},{"taxonomy":"integration-use-case","embeddable":true,"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/integration-use-case?post=53261"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}