trusted cloud

Secure, rapid deployment
for cloud workloads

Deliver time and cost savings by implementing an automated, repeatable configuration-as-code platform designed for highly sensitive workloads.  Enhanced security with Trusted Compute: realtime detection of erroneous activity and configuration errors secured through hardware-backed allowlists.

Hardware allowlists

Cloud security

Firewalls

CVE scans

IDS

Enable sensitive workloads on public cloud infrastructure

Secure Hosting from CyberHive uses Terraform and Ansible to provide a configuration-as-code environment designed to deploy and operate secure multi-account, multi-region, standardised secure public cloud environments such as AWS.

 

Secure environments are automatically deployed and configured and can be used to host and operate a wide range of different workload accounts without the need for material infrastructure changes.

 

The validation and assurance in the platform means it is not only fast to deploy but the scope and associated costs and time for further accreditation for any workload accounts is greatly reduced as the base security of the platform is a given. 

 

Our infrastructure delivers segregation of duties as standard. It restricts access from the workload accounts to the administrative and functional accounts. It audits the configuration of the cloud hosting accounts and services along with administrative actions and controls, and audits network access to and from the workload accounts. It provides automated scheduling to start and stop workload accounts assisting budget control and provides automated immutable backups of EC2 and RDS data. 

 

In summary CyberHive secure hosting delivers a secure, faster, more agile deployment solution for IaaS projects with best practice security controls in an automated, repeatable fashion delivering both cost and time savings. 

What's the cost of a data breach?

The reputational and financial damage suffered by organisations who have fallen victim to a cyber attack can be devastating.

Somehow cyber criminals can still remain undetected on networks long enough to carry out sophisticated attacks and steal sensitive data.

$ 0 M

Avg. breach cost

0 days

Time to detect and contain

0 %

Human element

> 0 %

Ransomware growth

CyberHive developed Trusted Compute in collaboration with the University of Oxford.  Our patented technology significantly reduces the time it takes to detect and locate data breaches down to seconds. Rapid detection has a very strong case when considering where to prioritise efforts to increase cyber resilience. The less time hackers and malicious insiders are left to snoop around your network unchallenged the better.

The Solution - CyberHive Trusted Cloud

By harnessing a unique combination of hardware-based cryptography and allow-listing, our patented Trusted Compute technology gives you the best server protection available.

Trusted Compute is unique, it combines advanced allow-listing technology with the power of a Hardware Security Module, a dedicated micro-controller that secures hardware through advanced cryptography. Allow-listing protects servers by ensuring that only approved code is running.

 

However, the need to periodically transmit a list of what is running to a verification service makes this approach vulnerable. During an attack, lists can be intercepted and altered by external hackers or malicious insiders. They can effectively cover their tracks, making it appear as if everything is normal.  Our developers have broken new ground for allow-listing by harnessing the unique properties of Intel’s Trusted Platform Module (TPM) to digitally ‘sign’ lists. Every few seconds this data is sent to a verification server to confirm that not even a single line of unauthorised code is running, offering robust defence against single points of failure, both technical and human.

 

CyberHive Trusted Compute can be deployed to protect your data in the cloud and on servers within your own data centre. With our unique trust verification technology you can check the ‘trusted’ status of your servers yourself. You no longer need rely on assurances from your cloud provider that your data is secure.

 

By rolling out Trusted Compute you can significantly reduce the costs of security and compliance. Our technology detects threat actors before they have a chance to do any damage.

Request more information

Contact the team to learn more about CyberHive secure hosting for sensitive workloads