Security and Compliance Reports

Demonstrate clear compliance standards to providers and covered entities.

Demonstrate Compliance Efforts Over Time

Unlike typical risk assessment tools, Dash enables organizations to monitor cloud security and compliance concerns over time. Dash continuous compliance monitoring allows your team to detect and resolve security concerns. Use Dash to set high security standards and build reports around your security efforts.

dash score
security compliance tear sheet

Compliance Tear Sheet

Generate a tear-sheet for your security program. See how security controls and policies relate to and address each individual security standard. Share your organizations security and compliance controls with covered entities and enterprise organizations.

Monitor and Report on Your Compliance State

Dash monitors your AWS cloud resources for security and compliance concerns. Dash alerts your team when cloud resources fall out of compliance with your security policies and provides steps for you remediation.

dash compliance score

Gain Visibility Into Your Organization’s Compliance Stature

  • Quickly understand your state of compliance in the cloud
  • Reduce risk and eliminate compliance issues to improve your security posture
  • Leverage automated monitoring and to keep your cloud secure
  • Resolve security issues and implement security best practices
  • Easily build reports and share security information with large enterprises
dash compliance center

Implement Continuous Compliance

Validate your security controls and demonstrate the effectiveness of your security program 

Build Custom Security Policies

Implement custom security policies built around regulatory compliance and cloud security. Answer vendor assessments easier by referring to established policies.

Monitor & Resolve Issues

Use Dash continuous compliance monitoring to detect and resolve security concerns and improve your overall security and risk profile.

Create Compliance Reports

Build reports based around your policies and cloud security controls. Share your compliance standards and controls with other organizations.

Built Around Compliance Standards

Dash Continuous Compliance Monitoring and Automatic Remediations are mapped to regulatory frameworks and industry-backed cybersecurity frameworks. This means you can discover compliance issues and resolve them with one click.

hipaa compliance
soc 2 type 2
nist hipaa compliance

Unencrypted EBS Volumes – 164.312(a)(2)(iv) Encryption and Decryption
Security Groups With All Ports Open To Public – 164.312(c)(1) Integrity + 164.312(e)(1) Transmission Security
Security Group Allows Unrestricted Network Traffic – 164.312(c)(1) Integrity + 164.312(e)(1) Transmission Security
Security Groups Opens DB Ports To Public – 164.312(c)(1) Integrity
Security Groups Opens SSH, FTP, SMTP Ports To Public – 164.312(c)(1) Integrity

Root Account In Use – 164.312(a)(2)(i) Unique User Identification
Password Reuse Is Allowed – 164.308(a)(5)(ii)(D) Password Management
Password Standards Are Insecure – 164.308(a)(5)(ii)(D) Password Management
User Access Keys Rotation Is Disabled – 164.312(a)(1) Access Control
IAM Inline Policies Are In Use – 164.312(c)(1) Integrity + 164.312(e)(2)(i) Integrity Controls
IAM NotActions Are In Use – 164.312(c)(1) Integrity
IAM AssumeRole Is Misconfigured – 164.312(c)(1) Integrity

S3 Bucket Does Not Have Encryption Enabled – 164.312(a)(2)(iv) Encryption and Decryption
S3 Bucket Does Not Have Versioning Enabled – 164.308(a)(7)(ii)(A) Data Backup Plan
S3 Bucket Does Not Have Logging Enabled – 164.312(b) Audit Controls
S3 Bucket Is Readable By All (Public) – 164.312(d) Person or Entity Authentication
S3 Bucket Is Writable By All (Public) – 164.312(d) Person or Entity Authentication

Prepare For Security Risk Assessments (SRAs)

Organizations must be prepared for security risk assessments (SRAs) when selling to covered entities and enterprise customers. Dash allows teams to build actionable security policies, implement technical safeguards and enforce high security standards through continuous compliance monitoring.

See how Dash can help team to build and validate your security program and share security information with stakeholders.

Download our Guide to Preparing for Security Risk Assessments

vendor risk assessment

Streamline Compliance Management In The Cloud

Build, monitor and share your security program with stakeholders.