Skip to content
NGTEdu Logo

NGTEdu

A PRODUCT OF NGTECH.CO.IN

NGTEdu Logo

NGTEdu

  • Home
  • Cyber Attacks
  • Malware
  • Vulnerabilities
  • Data Breach
  • Home
  • Data Breach
  • Cloud Auto-Remediation and Enforcement with Tripwire Configuration Manager
  • Data Breach

Cloud Auto-Remediation and Enforcement with Tripwire Configuration Manager

5 years ago Ben Layer
Cloud Auto-Remediation and Enforcement with Tripwire Configuration Manager

Determining the security posture for an increasing quantity of cloud accounts and services used by many organizations can feel overwhelming, but Tripwire Configuration Manager can help you find, fix, and even enforce settings for common security problems in cloud services. In this blog, we will show how the simple steps required to have Tripwire Configuration Manager automatically fix common configuration issues.

Getting started with Tripwire Configuration Manager is simple, and users can view cloud account configuration results in minutes. It assesses your cloud accounts (such as Amazon Web Services, Azure, Google Cloud Platform) and provides guidance on which configuration items meet or do not meet best practice standards.

In the following screen capture, we have audited an AWS account with the Amazon Web Services Foundations version 1.3 benchmark policy. In this account, we have highlighted three existing configuration deficiencies that Tripwire Configuration Manager can auto remediate.

Selecting the issue titled “Validate That Password Policy MinimumPasswordLength is 14 or Greater” displays information about the selected failing policy compliance test including the current value. In this case, our minimum password length of 6 falls far below the Center for Internet Security recommended value of 14.

Conveniently, Tripwire’s solution offers automated remediation with the Fix Now capability. Selecting Run Fix Now will update the cloud account configuration so that the minimum password length required for logins is 14 characters, which is in line with the CIS AWS Benchmark for best practices. Tripwire Configuration Manager can fix numerous common misconfigurations in cloud control panels and storage.

Validate password

Unauthorized changes are a leading cause of breaches, so once a fix is in place, you may also wish to enforce settings to protect against unplanned changes occurring at a later date. To safeguard against unauthorized changes, this form also provides the option to “Fix automatically in future.”

fix account

By selecting this option, you empower the manager to enforce this setting, automatically reverting future unauthorized changes back to the secure value.  

Start a Free Trial today to discover how Tripwire Configuration Manager can keep your cloud accounts compliant with best practice configurations by automatically remediating and enforcing common secure configurations.

The post ” Cloud Auto-Remediation and Enforcement with Tripwire Configuration Manager” appeared first on TripWire

Source:TripWire – Ben Layer

Tags: Cloud, Encryption, Google, Microsoft, TripWire

Continue Reading

Previous Critical Flaws Affect Embedded TCP/IP Stack Widely Used in Industrial Control Devices
Next New Chinese Spyware Being Used in Widespread Cyber Espionage Attacks

More Stories

  • Cyber Attacks
  • Data Breach

AISURU/Kimwolf Botnet Launches Record-Setting 31.4 Tbps DDoS Attack

3 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

ThreatsDay Bulletin: Codespaces RCE, AsyncRAT C2, BYOVD Abuse, AI Cloud Intrusions & 15+ Stories

7 hours ago [email protected] (The Hacker News)
  • Data Breach

The Buyer’s Guide to AI Usage Control

9 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Infy Hackers Resume Operations with New C2 Servers After Iran Internet Blackout Ends

10 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

Critical n8n Flaw CVE-2026-25049 Enables System Command Execution via Malicious Workflows

14 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

Malicious NGINX Configurations Enable Large-Scale Web Traffic Hijacking Campaign

15 hours ago [email protected] (The Hacker News)

Recent Posts

  • AISURU/Kimwolf Botnet Launches Record-Setting 31.4 Tbps DDoS Attack
  • ThreatsDay Bulletin: Codespaces RCE, AsyncRAT C2, BYOVD Abuse, AI Cloud Intrusions & 15+ Stories
  • The Buyer’s Guide to AI Usage Control
  • Infy Hackers Resume Operations with New C2 Servers After Iran Internet Blackout Ends
  • Critical n8n Flaw CVE-2026-25049 Enables System Command Execution via Malicious Workflows

Tags

Android APT Bug CERT Cloud Compliance Coronavirus COVID-19 Critical Severity Encryption Exploit Facebook Finance Google Google Chrome Goverment Hacker Hacker News High Severity Instagram iPhone Java Linux Low Severity Malware Medium Severity Microsoft Moderate Severity Mozzila Firefox Oracle Patch Tuesday Phishing Privacy QuickHeal Ransomware RAT Sim The Hacker News Threatpost TikTok TripWire VMWARE Vulnerability Whatsapp Zoom
Copyright © 2020 All rights reserved | NGTEdu.com
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More here.Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT