Risk Assessment

The Risk Assessment feature in Movestax is designed to help you identify and address vulnerabilities across your cloud environments. It runs over 200 configuration and vulnerability checks across multiple cloud vendors, with more checks being continuously added.

The Risk Assessment feature in Movestax is designed to help you identify and address vulnerabilities across your cloud environments. It runs over 200 configuration and vulnerability checks across multiple cloud vendors, with more checks being continuously added.

The Risk Assessment feature in Movestax is designed to help you identify and address vulnerabilities across your cloud environments. It runs over 200 configuration and vulnerability checks across multiple cloud vendors, with more checks being continuously added.

On this page

On this page

On this page

Categories

These assessments cover a wide range of categories, including:


  • Database

  • Networking

  • Identity and Access

  • Compute

  • Application Services

  • Compliance

  • and more


By leveraging this feature, you can ensure that your cloud infrastructure is secure, compliant, and aligned with industry best practices.

Running a Risk Assessment

To perform a risk assessment, follow these steps:


  1. Select the Cloud Subscription:

  • Begin by selecting the Connection Link associated with the cloud subscription you wish to assess. The connection link represents the specific cloud environment (e.g., AWS, Azure, GCP) that you want to validate?


  1. Initiate the Assessment:

  • Once the connection link is selected, Movestax will automatically run the risk assessment across the chosen cloud subscription. The assessment evaluates various aspects of your infrastructure, scanning for vulnerabilities and configuration issues in the selected categories.

  1. Scoring and Analysis:

  • Risk Score: After the assessment is completed, Movestax provides a Risk Score based on the number and severity of vulnerabilities found. This score is also benchmarked against other peers in your industry, giving you a clear understanding of where your cloud environment stands in comparison to others.



  • List of Vulnerabilities: Each identified issue is listed, along with the affected resources.



  • Detailed Report: Along with the score, you will receive a detailed report that includes:

    • Impact: What is the real impact of the issue.

    • Remediation Steps: For each issue, Movestax provides guidance on how to resolve it, including links to the vendor's official documentation.

    • Resource Impact: Details about which specific resources are affected by each vulnerability or configuration issue.


  1. Managing Alerts and Notifications:

  • You can set up Alerts to receive email notifications whenever a new vulnerability is detected in your cloud environment. This ensures that you stay informed about potential risks in real-time.

  • Multiple Email Recipients: Alerts can be sent to multiple email addresses, ensuring that the right people in your organization are notified.


  1. Ignoring Issues:

  • If certain issues are not relevant to your production environment—such as those related to a development or QA environment—you have the option to Ignore these issues. Ignored issues will not affect your overall Risk Score and will not trigger further alerts.

Continuous Monitoring and Updates

The Risk Assessment feature is not a one-time tool; it continuously monitors your cloud environments, providing ongoing assessments as your infrastructure evolves. New checks are regularly added to cover emerging threats and best practices, ensuring that your cloud environment remains secure and compliant over time.


Key Benefits


  • Comprehensive Coverage: With over 200 checks across diverse categories, Movestax offers a thorough assessment of your cloud environment.

  • Industry Benchmarking: Compare your Risk Score with industry peers to understand how your security posture stacks up.

  • Actionable Insights: Detailed reports and remediation steps help you quickly address and resolve vulnerabilities.

  • Proactive Alerts: Stay ahead of potential risks with real-time alerts and notifications.

  • Customizable: Tailor the assessment and alerts to fit your specific needs, ensuring relevance to your operational environment.

DOCS

DOCS

DOCS