The cloud security posture management (CSPM) offering comes with ToDo, an actionable checklist showing prioritized risks, and Remediation Guru, guided remediation at the source. Credit: CIS Unified container and cloud security firm Sysdig on Wednesday launched its cloud security posture management (CSPM) offering, which aggregates security findings by root cause and prioritizes remediation based on impact. The new offering consists of ToDo, an actionable checklist showing prioritized risks, and Remediation Guru, which offers guided remediation at the source. “We consistently hear from prospects that the cloud security tools they are familiar with inundate teams with alerts and findings. Compounding the issue is cutting through the noise to know where to devote resources,” said Maya Levine, product manager at Sysdig. Enterprises often have hundreds of cloud accounts and services spread across multiple cloud environments. They often automate the deployment of cloud services using infrastructure as code (IaC). If the IaC template has a configuration error, the same error can get replicated across cloud environments, generating multiple alerts and overwhelming security teams. Compounding the problem, policies and controls often cannot be applied across environments. This results in inconsistent policies across the organization for different parts of the software delivery pipeline. The lack of agnostic controls across the technology stack increases management complexity, according to the company. “The data we have around this is qualitative, this is a pain point that is repeatedly shared in feedback sessions,” Levine said. “The challenge is two-fold. First, of all the alerts and findings a security team deals with, how many of those are actionable? For example, does a vulnerability in an image have a fix yet? Second, how to prioritize what to focus on first?”ToDo is expected to save time during investigations and Remediation Guru could allow security and DevOps teams to fix issues in seconds with just a few clicks, the company said in a statement. Cloud security tool aims to reduce investigation timeToDo aggregates risks that have the same root cause and provides opinionated prioritization that reduces time spent on the investigation. Along with the help in identifying the risk it also implements fixes through Remediation Guru. Remediation Guru automatically generates the suggested change to IaC templates that can be applied with a single click. Because Sysdig has a shared policy model, teams can enforce policy across multiple clouds and Kubernetes environments. “ToDo guides users to take the actions that will have the highest impact. It does the work of aggregating resources with similar problems, prioritizing the most impactful actions, and guiding users to take meaningful remediations. This creates a streamlined process for security teams to view all the pressing issues in their environment grouped logically,” Levine said. Remediation Guru is available as a tech preview to all existing Sysdig Secure customers. ToDo on the other hand is available only on request. New customers however can access ToDo and Remediation Guru when they purchase Sysdig Secure. The company claims customers have been receptive to ToDo, which is currently in a controlled availability (CA) launch. “Sysdig has conducted feedback sessions with every customer that has ToDo enabled. The response has been overwhelmingly positive. Customers have stated that they expect to use it frequently and that they see the value in all that it offers,” Levine said. Related content news analysis SEC rule for finance firms boosts disclosure requirements Amendments to Regulation S-P requires broker-dealers, investment companies, registered investment advisers, and transfer agents to disclose incidents to customers. By Evan Schuman May 17, 2024 5 mins Data Breach Financial Services Industry Data Privacy feature DDoS attacks: Definition, examples, and techniques Distributed denial of service (DDoS) attacks have been part of the criminal toolbox for over twenty years, and they’re only growing more prevalent and stronger. By Josh Fruhlinger May 17, 2024 10 mins DDoS Cyberattacks news FCC proposes BGP security measures Protecting the Border Gateway Protocol is as important as protecting the border. By Gyana Swain May 17, 2024 1 min Regulation Network Security news US AI experts targeted in cyberespionage campaign using SugarGh0st RAT Threat actors use phishing techniques to obtain non-public information about generative artificial intelligence. By Lucian Constantin May 16, 2024 4 mins Phishing Data and Information Security PODCASTS VIDEOS RESOURCES EVENTS SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe