About the customer
Scone is a sustainability platform that helps organisations engage employees in reducing their carbon footprint. The platform promotes sustainability awareness and engagement through group challenges for mobility, home energy, lifestyle and biodiversity empowering users to develop sustainable habits and reduce their carbon emissions using behavioural science and AI.
The Challenges
Scone needed to enhance its cloud security posture to protect sensitive user data and ensure compliance with industry regulations. They sought to implement robust security measures across their Google Workspace and GCP environments, focusing on access management, logging and monitoring, network and data security, and data management and encryption. The goal was to enhance security, achieve compliance, and protect their systems from potential vulnerabilities.
The Solutions
Devoteam collaborated with Scone to conduct a comprehensive security remediation project. Key actions taken included:
- Access and Identity Management: Reviewing and optimising Scone’s corporate login credentials, service account keys, and IAM user roles to ensure least privilege access and minimise potential security risks.
- Logging and Monitoring: Implementing logging and monitoring mechanisms for various GCP services, enabling Scone to track activities, detect anomalies, and respond to security incidents promptly.
- Network and Data Security: Removing default networks, restricted SSH and RDP access, and enabled VPC Flow Logs to harden Scone’s network security. Implementation of Identity Aware Proxy (IAP) to provide secure access to Cloud SQL and Cloud Memorystore without public IPs.
- Data Management and Encryption: enabled uniform bucket-level access and provided comprehensive reports on BigQuery table encryption and default CMEK specification, ensuring data encryption and compliance with regulations.
The Results
Through Devoteam’s expertise and the implementation of these robust security measures, Scone significantly improved its overall security posture across GCP. They now have better control over access, enhanced monitoring capabilities, and stronger data protection mechanisms, ensuring a more secure and compliant environment for their valuable data and user information.
Secure your valuable data and user information with enhanced security in GCP