The software provider has also enhanced its underlying security and compliance mechanism Chef InSpec with new features. Credit: Kevin Infrastructure software provider Progress has announced the launch of Progress Chef Cloud Security to extend DevSecOps with compliance support for native cloud assets, enabling end-to-end management of on premise, cloud, and native cloud resources. In a press release, the company stated that the offering is complemented by new capabilities across the Chef portfolio targeting DevOps success in enterprise deployments to deliver a unified and scalable platform that accelerates the delivery of secure and compliant application releases in mixed computing environments.Chef Cloud Security extends DevOps to cloud environmentsAs technology evolves and organizations look to the cloud, there is an increasing need for businesses to apply proven, trusted DevOps approaches to public, private, and hybrid cloud workloads to address cloud-based challenges, Progress said. Chef Cloud Security has therefore been designed to deliver the following benefits:Facilitation of existing skillsets without time consuming and costly training for managing compliance and security posture for cloud-native technologies including containers, Kubernetes, and microservicesSupport for native-cloud assets for multi-cloud deployment across AWS, Azure, Google, and Alibaba clouds using certified CIS/DISA STIG profiles to scan and automatically detect security configuration issuesCoordination of security, development, testing, and operations participation to make it easier to carryout security checks at every stage of the DevOps pipeline with coded artifacts, automated tests and enterprise control, and visibilitySupport for success with t training, community and DevRel assistance, technical support as well as cloud-aligned pricing and licensing.“As businesses pivot to a digital-first economy, cloud will continue to play an even greater, and even dominant, role as the IT industry focuses on delivering greater efficiency, flexibility and faster innovation,” commented Jim Mercer, research director, DevOps and DevSecOps, at IDC. “Chef’s product development priorities are focused on improving security and compliance outcomes for customers, creating a unified DevOps approach for application assets, and making the Chef portfolio easier to adopt and use,” he added. New Chef InSpec features enhance compliance, securityAlong with the release of the Chef Cloud Security offering, Progress has also announced new features in its underlying security and compliance mechanism Chef InSpec. The firm said it has expanded data protection to include SAP ASE, IBM DB2, Mongo, Cassandra, Oracle, MS SQL. It also provides host CIS coverage for new RHEL, CentOS, Ubuntu Linux distributions and Mac OS Monterey. Progress has also extended CIS benchmark profile coverage for AWS, Azure, and GCP, with customizable pre-built service and resource templates for more than 100 cloud resources to reduce security implementation effort. “Over the past several years, Chef – now under the leadership of Progress – has placed significant focus on building out security and compliance capabilities to make the DevSecOps concept achievable for our customers,” said Sundar Subramanian, executive vice president and general manager, DevSecOps, Progress. “Through a policy-as-code approach, we are extremely excited to see what our customers will accomplish as they aspire to end-to-end DevOps.”Progress is set to debut the latest additions to its portfolio during a live virtual event on May 25. Related content brandpost Sponsored by Microsoft Security New threat trends emerge out of East Asia With total vigilance concerning the latest East Asian developments in the threat landscape, security leaders can enhance their readiness to safeguard against the most imminent dangers. By Microsoft Security May 14, 2024 5 mins Security news Equipped with AI tools, hackers make apps riskier than ever The odds of attacks are growing as attackers can now easily access code modification and reverse engineering tools. By Shweta Sharma May 14, 2024 4 mins Application Security feature Low-tech tactics still top the IT security risk chart USB-based attacks, QR codes for phishing and social engineering continue to be some of the most effective, now more dangerous with the help of AI. By Rosalyn Page May 14, 2024 9 mins Cyberattacks Social Engineering Data and Information Security how-to Download the SASE and SSE enterprise buyer’s guide From the editors of our sister publication Network World, this enterprise buyer’s guide helps network and security IT staff understand what SASE (Secure Access Service Edge) and SSE (Secure Service Edge) can do for their organizations and how t By Neal Weinberg May 13, 2024 1 min Remote Access Security Network Security Enterprise Buyer’s Guides PODCASTS VIDEOS RESOURCES EVENTS SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe