top of page

Mitigate Ransomware through Automation:
Welcome to Anti-Ransomware Automation

Abstract Background
Abstract Background

Adopt a Framework

In line with  AWS' Ransomware ebook, ransomware requires a holistic approach to mitigation. 


The starting point is adoption or alignment with a security framework, but 6pillars' Anti-Ransomware Automation has now been developed to reference NIST CSF coupled with autoremediation to help customers Protect, Detect and Recover automatically.

Deployment of AWS native security and compliance services configured to best practice allows companies to adhere to security framework best practice in the following areas:


Access Control

Awareness and Training

Data Security

Information Protection Processes and Procedures


Protective Technology


Anomalies and Events

Continuous Security Monitoring Detection Processes


Recovery Planning




How Automation delivers Mitigation through Best Practice

Automation accelerates adoption of security best practice and, when combined with AWS native security and compliance services configured to best practice, materially mitigates the risk of ransomware attacks.

6pillars' automation ensures that AWS infrastructure is continuously compliant with best practice.

Critical aspects of security such as asset detection, network configuration (e.g. ensuring no public access to SSH or RDP), user access permissions, vulnerability management and password strength are all continuously monitored  and remediated automatically in real time using 6pillars' Patent Pending automation platform and comprehensive automation playbook library.

In particular, alignment with AWS security best practice greatly reduces the risk of privilege escalation, which is often crucial to many ransomware attacks.

caution 1.png

Prevention + Recovery

When combined with timely, regular and tested backups, both prevention and recovery can work in concert to mitigate the risk, likelihood, impact of an attack and speed recovery associated with ransomware attacks if they occur.

Per AWS best practice, defining, testing and performing data backup and recovery plans is critical in mitigating the impact ransomware can have on organisations.


The most effective strategy for mitigating the impact of a ransomware attack is to regularly backing up and verifying systems with regular recovery testing. This helps protect against deletion or destruction of data during a ransomware attack by being prepared to make data stored in a backup readily available for restoration to new production environments if required.


This is turn can lead to improved response and recovery.


Customers can now leverage automation developed by 6pillars with AWS Elastic Disaster Recovery Service (AWS DRS) to automatically ensure RTO and RPOs are established, tested and met when they are most needed.

output-onlinepngtools (1).png

Selecting a provider

Selecting a cybersecurity and continuous compliance automation provider has traditionally been out of reach for most organisations. 

With the advancement of AWS cloud technology the door has been opened through automation.

Best practice cybersecurity and compliance is available to any sized organisation, at a fraction of the cost.

Abstract Blue Light

how it works

6pillars' AUTOMATE+ & AUTOMATE+ enterprise couple deployment of a comprehensive suite of AWS-Native security and compliance services with 6pillars' Patent Pending Automation Application and Playbook Library, providing customers with a real time automated cyber security and continuous compliance capability.

bottom of page