Securing the Cloud for a Leading Southeast-Based Car Wash Chain
Automotive
Executive Summary
A prominent family-owned car wash chain operating over 80 locations across the Southeastern United States partnered with Aligned Technology Group to fortify its AWS cloud infrastructure. A thorough security assessment revealed critical vulnerabilities—ranging from misconfigured IAM policies to unencrypted storage. Aligned Technology Group executed a full-scale remediation project, introducing organization-wide controls, enhanced access policies, data encryption, centralized logging, and real-time monitoring. As a result, the car wash company now operates in a secure, compliant, and audit-ready AWS environment with improved visibility and threat detection.
Customer Overview
This multi-location car wash company, founded in 1969 and headquartered in Charlotte, North Carolina, is one of the largest family-owned operations in the industry. With a reputation for environmental responsibility and outstanding service, the business continues to innovate its operations—leveraging technology to deliver fast, eco-friendly vehicle cleaning across more than 80 Southeast locations.
Situation
The car wash company managed several AWS accounts, including Production, Management, Audit, and Logging. A cloud security assessment by Aligned Technology Group identified key vulnerabilities: overly permissive IAM roles, missing logging alerts, unencrypted EBS volumes, and public exposure risks in S3 buckets. The customer required a structured plan to resolve these issues and bring their environment in line with AWS best practices and security benchmarks.
Task
The company engaged Aligned Technology Group to perform a full AWS security remediation. Objectives included addressing issues across IAM, data encryption, monitoring, and alerting—while implementing scalable and compliant security configurations throughout the cloud environment.
Action
Aligned Technology Group took a phased, methodical approach to remediation across the affected AWS environments:
1. IAM, SSO, and Access Analyzer Enhancements
- 
Enforced password policies (14+ characters, history enforcement).
 - 
Deactivated unused credentials and enforced MFA.
 - 
Restricted users to one active access key with rotation enforcement.
 - 
Migrated access control to groups and roles.
 - 
Activated IAM Access Analyzer in all AWS regions.
 
2. S3 Security Hardening
- 
Blocked HTTP access through bucket policies.
 - 
Enabled MFA Delete and blocked public access.
 - 
Verified classification and security of stored data.
 
3. Logging, Monitoring, and Encryption
- 
Encrypted all EBS volumes with pre-snapshot backups.
 - 
Enabled AWS Config and CloudTrail in all regions, protected with KMS.
 - 
Deployed VPC Flow Logs.
 - 
Configured CloudWatch alarms for:
- 
Unauthorized API activity
 - 
Root account usage
 - 
Login failures and key deletions
 - 
Security group, VPC, and organization changes
 
 - 
 
4. Security Hub and Network ACL Compliance
- 
Deployed AWS Security Hub for centralized security findings.
 - 
Hardened network ACLs by restricting public administrative access
 
ATG Engagement & Expertise
- Elastic Security Engineering: AWS-native, hands-on remediation
 - Security Hardening: End-to-end IAM and encryption enforcement
 - Compliance Readiness: Alignment with AWS and CIS frameworks
 - Audit-Friendly Controls: Logging and alerting for critical actions
 - Cost Awareness: Budget-conscious implementation of KMS and Security Hub
 
Result
Aligned Technology Group successfully transformed the customer’s AWS security posture. With robust encryption, access control, and real-time alerting in place, the company is now well-positioned for compliance audits and proactive threat detection. Their cloud environment has matured into a secure and resilient infrastructure aligned with modern cloud security standards.
			Last Updated on June 12, 2025 by Lauryn Colatuno
				