Enhancing Security and Simplifying AWS Accounts for a Leading Global Appliances Player
Apopular worldwide brand that offers a comprehensive range of solutions for spaces, including homes, offices, stores, and other commercial facilities specializes in creating appliances for multiple purposes, such as life solutions like electrical construction and housing materials, IoT-connected solutions for B2B, innovative devices and appliances for the auto industry, and a diverse range of products and services for the industrial sector.
Better control over AWS accounts and security
The client had a crucial need to streamline their AWS accounts due to multiple isolated environments being used. These environments were in the form of different AWS accounts, which resulted in no centralized visibility and control. The appliances leader wanted to implement standardized AWS best practices and maintain their organization’s security standards, to take better control. The complexity of the situation meant that it was necessary to find a solution that would not only integrate these different AWS accounts but also provide centralized control and visibility to meet the client’s specific needs.
Their requirements primarily included:
Centralized Control & Cost Visibility for Appliances Leader
Umbrella Infocare proposed a solution for the global appliances giant that utilizes an AWS landing zone with AWS Control Tower. This allows for the automation of setup using best practices blueprints and the configuration of an account factory with pre-approved network configurations and region selections. This solution provides centralized control and visibility into multiple AWS accounts, ensuring standardized AWS best practices and security standards.
The setup helps the customer:
AWS Services used:
Enhanced Security & Easy Management
Umbrella Infocare’s proposed solution provided several benefits to Panasonic. It streamlined and standardized their AWS accounts, enhanced security, and ensured compliance with organizational standards. The solution centralized control and visibility and disallowed unauthorized access to sensitive data. It also employed preventive and detective guardrails to stop configuration changes and continuously detect changes.