Principles of least privilege, remove permanent access, security for docker images in CI, and more

August 12, 2024

We're thrilled to announce a series of enhancements designed to fortify your cloud environment and streamline your security operations. Last month, we focused on strengthening container security, enhancing identity and access management, and improving your overall user experience. From bolstering your CI/CD pipeline with Docker image vulnerability scanning to optimizing IAM permissions and streamlining notifications. These advancements are a testament to our commitment to providing you with the tools and insights needed to protect your cloud environment effectively.

Secure your Docker Images in the CI Pipeline (GitHub Actions and Jenkins)

Fortify your CI/CD pipelines with our expanded Docker Image Vulnerability Scanning, now available for GitHub Actions and Jenkins. Proactively identify and block vulnerable images, incorporate Quality Gates, ensuring only secure code reaches production. Findings are now displayed directly within the pipeline and the Cloudanix Console, ensuring a clear view of your container security posture.

Achieve Principles of Least Privilege for AWS & GCP SSO setup

IAM Right Sizing capability has been extended to support SSO setup. Cloudanix now supports Permissions assignment at AWS IAM Identity Center and Google Workspace for Right Sizing determination. This helps our customers understand Over Privilege, Unused Privilege and make corrections to achieve the principle of Least Privilege. Gain granular control over user permissions across AWS and GCP, preventing over-privileged access and minimizing risk.

Know more about our Identity and Access Management capabilities >

Remove Permanent Access from your GCP environments

With this release, we have introduced support for IAM JIT in GCP. Both IAM and Workspace Users. Our customers using SSO can leverage JIT to Elevate and Revoke Privileges for Cloud Users. With many levers to control the Privileges being requested like

  1. Manage JIT Eligibility for Roles
  2. Auto Approve if Roles are limited in permissions
  3. Define Maximum Duration of JIT Access
  4. And More.

Monitor new AWS Regions seamlessly

Cloudanix can now monitor all Opted In regions along with default Enabled Regions. Stay ahead of emerging risks with automatic discovery and monitoring of new AWS regions, without any configuration changes.

Revamped Notifications

Our revamped notifications provide clear and actionable insights, helping you focus on what truly matters. All the notifications (Daily Summary, Realtime Notifications) are revamped to highlight the most impactful findings. With this re-design our customers can quickly find out the right context directly in the email itself.

TODO:// is not an option for Cloud Security

Explore these features here

We are also available at

Insights from Cloudanix

Cloudanix and Kapittx case study

Case Studies

The real-world success stories where Cloudanix came through and delivered. Watch our case studies to learn more about our impact on our partners from different industries.

Cloud compliance checklist - Cloudanix

Checklist for you

A collection of several free checklists for you to use. You can customize, stack rank, backlog these items and share with your other team members.

Go to checklists
Cloudanix Documentation

Monthly Changelog

Level up your experience! Dive into our latest features and fixes. Check monthly updates that keep you ahead of the curve.

Take a look
CSPM role in operating cloud workload

Blogs

Cloudanix blog repository for you to gain insights on what is happening in cloud world.

Read the blog
Cloudanix Documentation

Cloudanix docs

Cloudanix offers you a single dashboard to secure your workloads. Learn how to setup Cloudanix for your cloud platform from our documents.

Take a look
Learn about CSPM

Learn Repository

Your ultimate guide to cloud and cloud security terms and concepts, all in one place

Read more