The cloud security posture management (CSPM) offering comes with ToDo, an actionable checklist showing prioritized risks, and Remediation Guru, guided remediation at the source. Credit: CIS Unified container and cloud security firm Sysdig on Wednesday launched its cloud security posture management (CSPM) offering, which aggregates security findings by root cause and prioritizes remediation based on impact. The new offering consists of ToDo, an actionable checklist showing prioritized risks, and Remediation Guru, which offers guided remediation at the source. “We consistently hear from prospects that the cloud security tools they are familiar with inundate teams with alerts and findings. Compounding the issue is cutting through the noise to know where to devote resources,” said Maya Levine, product manager at Sysdig. Enterprises often have hundreds of cloud accounts and services spread across multiple cloud environments. They often automate the deployment of cloud services using infrastructure as code (IaC). If the IaC template has a configuration error, the same error can get replicated across cloud environments, generating multiple alerts and overwhelming security teams. Compounding the problem, policies and controls often cannot be applied across environments. This results in inconsistent policies across the organization for different parts of the software delivery pipeline. The lack of agnostic controls across the technology stack increases management complexity, according to the company. “The data we have around this is qualitative, this is a pain point that is repeatedly shared in feedback sessions,” Levine said. “The challenge is two-fold. First, of all the alerts and findings a security team deals with, how many of those are actionable? For example, does a vulnerability in an image have a fix yet? Second, how to prioritize what to focus on first?”ToDo is expected to save time during investigations and Remediation Guru could allow security and DevOps teams to fix issues in seconds with just a few clicks, the company said in a statement. Cloud security tool aims to reduce investigation timeToDo aggregates risks that have the same root cause and provides opinionated prioritization that reduces time spent on the investigation. Along with the help in identifying the risk it also implements fixes through Remediation Guru. Remediation Guru automatically generates the suggested change to IaC templates that can be applied with a single click. Because Sysdig has a shared policy model, teams can enforce policy across multiple clouds and Kubernetes environments. “ToDo guides users to take the actions that will have the highest impact. It does the work of aggregating resources with similar problems, prioritizing the most impactful actions, and guiding users to take meaningful remediations. This creates a streamlined process for security teams to view all the pressing issues in their environment grouped logically,” Levine said. Remediation Guru is available as a tech preview to all existing Sysdig Secure customers. ToDo on the other hand is available only on request. New customers however can access ToDo and Remediation Guru when they purchase Sysdig Secure. The company claims customers have been receptive to ToDo, which is currently in a controlled availability (CA) launch. “Sysdig has conducted feedback sessions with every customer that has ToDo enabled. The response has been overwhelmingly positive. Customers have stated that they expect to use it frequently and that they see the value in all that it offers,” Levine said. Related content feature Key findings from the CISA 2022 Top Routinely Exploited Vulnerabilities report CISA’s recommendations for vendors, developers, and end-users promote a more secure software ecosystem. By Chris Hughes Sep 21, 2023 8 mins Zero Trust Threat and Vulnerability Management Security Practices news Insider risks are getting increasingly costly The cost of cybersecurity threats caused by organization insiders rose over the course of 2023, according to a new report from the Ponemon Institute and DTEX Systems. By Jon Gold Sep 20, 2023 3 mins Budget Data and Information Security news US cyber insurance claims spike amid ransomware, funds transfer fraud, BEC attacks Cyber insurance claims frequency increased by 12% in the first half of 2023 while claims severity increased by 42% with an average loss amount of more than $115,000. By Michael Hill Sep 20, 2023 3 mins Insurance Industry Risk Management news Intel Trust Authority attestation services now in general availability Formerly known as Project Amber, Intel’s attestation services support confidential computing deployments. By Michael Nadeau Sep 20, 2023 3 mins Zero Trust Security Hardware Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe