Skip to content
NGTEdu Logo

NGTEdu

A PRODUCT OF NGTECH.CO.IN

NGTEdu Logo

NGTEdu

  • Home
  • Cyber Attacks
  • Malware
  • Vulnerabilities
  • Data Breach
  • Home
  • Data Breach
  • Achieve CIS Compliance in Cloud, Container and DevOps Environments
  • Data Breach

Achieve CIS Compliance in Cloud, Container and DevOps Environments

5 years ago Ben Layer
Achieve CIS Compliance in Cloud, Container and DevOps Environments

If you are embracing DevOps, cloud and containers, you may be at risk if you’re not keeping your security methodologies up to date with these new technologies. New security techniques are required in order to keep up with current technology trends, and the Center for Internet Security (CIS) provides free cybersecurity best practices for many newer platforms.

The CIS benchmarks and controls provide clear instruction to help any organization tackle threats and reduce risk. Meanwhile, Tripwire makes benchmark alignment simple in cloud and container environments, securing each component of your DevOps toolchain.

Cloud

Many organizations are moving on-premise infrastructure into the cloud, which requires a wealth of new security know-how. Traditional security monitoring tools may lack visibility into these new environments. CIS has released benchmarks for Amazon Web Services, Microsoft Azure and Google Cloud Platform, giving much-needed guidance for those charged with securing these platforms. These benchmarks cover both familiar topics with a cloud twist and also new paradigms, everything from Identity and Access Management (IAM) configuration to virtual networking and computing.

Tripwire Configuration Manager helps overcome the cloud infrastructure visibility problem, allowing the monitoring of cloud configuration data and validation of CIS compliance within your cloud platforms.  Common misconfigurations can be automatically remedied and enforced by Tripwire Configuration Manager, elevating your security baseline in less time while requiring fewer resources.

Containers

Another hot topic is containerization, and many of those embracing containers are unaware that the misconfiguration of container hosts can be equivalent to granting domain administrator permissions to a successful attacker. Locking down your container hosts is essential, and CIS once again provides benchmarking guides for Docker and Kubernetes hosts to keep them secure.

Tripwire Enterprise powers automated monitoring of Docker and Kubernetes hosts for CIS compliance, ensuring a best practice security posture for your container hosts.

DevOps

While cloud and container infrastructure are important parts of DevOps, there are still more ways that Tripwire can help achieve CIS policy compliance within your DevOps process. Tripwire for DevOps allows for CIS benchmark policy evaluation of Docker images in your build pipeline. Performing compliance validation in your CI/CD tools, such as Jenkins or TeamCity, is one method of integrating security earlier in your DevOps cycle, or “shifting security to the left.”

This enables quicker time to resolution for any compliance issues arising in the development and deployment process, and can keep security risks from ever manifesting in your production environment.

Center for Internet Security benchmark recommendations are free cybersecurity best practice guidelines and a great first step for securing your DevOps infrastructure and components. They provide prioritized guidance and clear remediation steps for combating misconfigurations.

Tripwire solutions empower the user to achieve CIS policy compliance in both DevOps build processes and in an ongoing continuous manner once deployed by automating configuration checks and supplying clear remediation information.

Learn more about how Tripwire solutions can help secure your cloud, container and DevOps assets.

The post ” Achieve CIS Compliance in Cloud, Container and DevOps Environments” appeared first on TripWire

Source:TripWire – Ben Layer

Tags: Cloud, Encryption, Google, Microsoft, TripWire

Continue Reading

Previous Hackers Exploit Accellion Zero-Days in Recent Data Theft and Extortion Attacks
Next Shadow Attacks Let Attackers Replace Content in Digitally Signed PDFs

More Stories

  • Critical Vulnerability
  • Data Breach
  • Vulnerabilities

Claude Opus 4.6 Finds 500+ High-Severity Flaws Across Major Open-Source Libraries

3 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach

AISURU/Kimwolf Botnet Launches Record-Setting 31.4 Tbps DDoS Attack

15 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

ThreatsDay Bulletin: Codespaces RCE, AsyncRAT C2, BYOVD Abuse, AI Cloud Intrusions & 15+ Stories

20 hours ago [email protected] (The Hacker News)
  • Data Breach

The Buyer’s Guide to AI Usage Control

21 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Infy Hackers Resume Operations with New C2 Servers After Iran Internet Blackout Ends

22 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

Critical n8n Flaw CVE-2026-25049 Enables System Command Execution via Malicious Workflows

1 day ago [email protected] (The Hacker News)

Recent Posts

  • Claude Opus 4.6 Finds 500+ High-Severity Flaws Across Major Open-Source Libraries
  • AISURU/Kimwolf Botnet Launches Record-Setting 31.4 Tbps DDoS Attack
  • ThreatsDay Bulletin: Codespaces RCE, AsyncRAT C2, BYOVD Abuse, AI Cloud Intrusions & 15+ Stories
  • The Buyer’s Guide to AI Usage Control
  • Infy Hackers Resume Operations with New C2 Servers After Iran Internet Blackout Ends

Tags

Android APT Bug CERT Cloud Compliance Coronavirus COVID-19 Critical Severity Encryption Exploit Facebook Finance Google Google Chrome Goverment Hacker Hacker News High Severity Instagram iPhone Java Linux Low Severity Malware Medium Severity Microsoft Moderate Severity Mozzila Firefox Oracle Patch Tuesday Phishing Privacy QuickHeal Ransomware RAT Sim The Hacker News Threatpost TikTok TripWire VMWARE Vulnerability Whatsapp Zoom
Copyright © 2020 All rights reserved | NGTEdu.com
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More here.Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT