Threat Stack, the leader in cloud-native security and compliance management, today announced the launch of its Guided Rules Editor for AWS Configuration Auditing, available immediately in the Threat Stack Audit Plan. These industry-leading capabilities will save Security and Operations teams hours of time by enabling them to quickly tailor AWS Configuration Auditing rulesets to their unique security policy and adapt to changes in their environment.
The Threat Stack Guided Rules Editor is the first intuitive, guided approach to customizing security rules for a cloud environment. It does not require users to be able to code, have knowledge of AWS syntax, or manage a repository of scripts. Now, Threat Stack customers can edit, clone, and create new configuration auditing rules with the easy-to-use Guided Rules Editor, providing more accurate, relevant security visibility into unique AWS environments.
“AWS security and compliance is critically important to delivering health and financial intelligence to customers,” said Steve Caldwell, Director of Engineering, Springbuk. “Threat Stack Configuration Auditing allows us to meet AWS security best practices, and the continuous monitoring gives us visibility into our servers across our infrastructure to make sure we are meeting and maintaining critical compliance requirements.”
The AWS API syntax is integrated into the Threat Stack Guided Rules Editor, allowing users to write rules without spending time researching AWS documentation. Users can make small modifications to existing rules (for example, changing a required password length), or create a new rule to evaluate a range of properties on the supported AWS resource types. To create or edit a rule, the Guided Rules Editor walks users through defining which service(s) need to be monitored, selecting an appropriate resource type, and defining evaluation statements to contain the rule to specific parameters. It then guides the user through AWS API syntax by providing an appropriate next value based on what they selected previously.
“No two organizations’ security needs are the same. We want to make it as easy as possible for customers to create and enforce their own unique policy,” says Megan Ahigian, Product Manager at Threat Stack. “There’s no need to know the AWS API structure, no need to write code, and nothing to debug. You can customize your rules in seconds to make sure you have most accurate visibility into your environment.”
Threat Stack provides cloud-native security capabilities to support organizations of all sizes through their cloud security maturity: from automatically auditing their AWS environment, to continuously monitoring and alerting, to deep investigation and remediation of security incidents. Threat Stack’s new Guided Rules Editor makes the early stages of auditing and establishing a security baseline easier than ever before.
For more information or to start a free trial of Threat Stack Configuration Auditing, visit https://get.threatstack.com/audit-trial-request.
About Threat Stack
Threat Stack enables growth-driven companies to scale with confidence by identifying and verifying insider threats, external attacks and data loss in real-time. The only fully integrated, cloud-native security platform that gives customers instant visibility and automatically responds to changes in their environment throughout the stages of their cloud security maturity, from auditing their environment, to continuous monitoring and alerting, to investigation and remediation.Threat Stack provides the coverage needed to run secure and compliant, in all environments, without sacrificing speed and efficiency. For more information, or to start a free trial, visit threatstack.com.