CNAPP capabilities for container security and cloud vulnerabilities 

CNAPP capabilities for container security and cloud vulnerabilities

Share post

CrowdStrike extends CNAPP capabilities to secure containers and help developers quickly identify and remediate cloud vulnerabilities. The extension of agent-based and agentless protection adds support for Amazon ECS and enables DevSecOps teams to develop in AWS environments even more securely.

CrowdStrike, a leading provider of cloud-based protection for endpoints, workloads, identity and data, announced powerful new capabilities of the Cloud Native Application Protection Platform (CNAPP). With the new capabilities, CrowdStrike Cloud Security now includes support for Amazon Elastic Container Services (ECS) within AWS Fargate, adds eight new container registries to image registry scanning, and enables open-source Software Composition Analysis (SCA). -Software.

AWS—Amazon Elastic Container Services (ECS)

Containers have transformed the way applications are developed, tested, and consumed because they can be deployed instantly and at scale in any environment. With the proliferation of containers, it's important that organizations have access to tools that provide greater visibility into their containerized applications so they can operate more securely. With support for Amazon ECS and existing support for Amazon Elastic Kubernetes Service (Amazon EKS), organizations have access to more security tools to manage their AWS Fargate environment.

CrowdStrike offers agentless and agent-based CNAPP capabilities through a unified, integrated platform. The following functions are now added:

  • Support for AWS Fargate with Amazon ECS: Additional security controls for container environments through identification of rogue containers and drift detection. This feature extends the functionality already available for AWS Fargate with Amazon EKS.
  • Software composition analysis: Improve application security and compliance by detecting and remediating vulnerabilities in open source components in the application code base. Open Language support includes Go, JavaScript, Java, Python and Ruby.
    Scanning image registries for Docker Registry 2.0, IBM Cloud Container Registry, JFrog Artifactory, Oracle Container Registry, Red Hat OpenShift,
  • Red Hat Quay, Sonatype Nexus Repository and VMware Harbor Registry: Enables identification of hidden threats and configuration issues in containers to reduce attack surface and secure continuous integration (CI)/continuous delivery (CD) pipelines. This feature extends the existing capabilities for Amazon Elastic Container Registry (ECR), Docker Registry and other cloud registries.

“With the proliferation of open source and containers, organizations are looking for a CNAPP that gives them full visibility into their development pipeline. This will foster a DevSecOps culture where developers integrate security into their day-to-day workflow,” said Doug Cahill, vice president, analyst services and senior analyst at Enterprise Strategy Group (ESG). "The addition of SCA and the addition of new container registries within the image registry scanning tool are compelling additions to Crowdstrike's CNAPP offering."

CNAPP with or without agents

CrowdStrike's attacker-focused approach to CNAPP offers both agent-based (Falcon CWP) and agentless (Falcon Horizon - CSPM) solutions delivered via the Falcon platform. This gives organizations the flexibility to decide how best to secure their cloud applications across the continuous integration/continuous delivery (CI/CD) pipeline and cloud infrastructure on AWS and other cloud providers. The added benefit of an agent-based CWP solution is that it provides pre-runtime and runtime protection, as opposed to agentless-only solutions that provide only partial visibility and cannot provide remediation.

More at CrowdStrike.de

 


About CrowdStrike

CrowdStrike Inc., a global leader in cybersecurity, is redefining security in the cloud age with its completely redesigned platform for protecting workloads and devices. The lean single-agent architecture of the CrowdStrike Falcon® platform uses cloud-scaled artificial intelligence and ensures protection and transparency across the company. This prevents attacks on end devices both inside and outside the network. With the help of the company's own CrowdStrike Threat Graph®, CrowdStrike Falcon correlates around 1 trillion endpoint-related events worldwide every day and in real time. This makes the CrowdStrike Falcon platform one of the world's most advanced data platforms for cybersecurity.


 

Matching articles on the topic

Cybersecurity platform with protection for 5G environments

Cybersecurity specialist Trend Micro unveils its platform-based approach to protecting organizations' ever-expanding attack surface, including securing ➡ Read more

Data manipulation, the underestimated danger

Every year, World Backup Day on March 31st serves as a reminder of the importance of up-to-date and easily accessible backups ➡ Read more

Printers as a security risk

Corporate printer fleets are increasingly becoming a blind spot and pose enormous problems for their efficiency and security. ➡ Read more

The AI ​​Act and its consequences for data protection

With the AI ​​Act, the first law for AI has been approved and gives manufacturers of AI applications between six months and ➡ Read more

Windows operating systems: Almost two million computers at risk

There are no longer any updates for the Windows 7 and 8 operating systems. This means open security gaps and therefore worthwhile and ➡ Read more

AI on Enterprise Storage fights ransomware in real time

NetApp is one of the first to integrate artificial intelligence (AI) and machine learning (ML) directly into primary storage to combat ransomware ➡ Read more

DSPM product suite for Zero Trust Data Security

Data Security Posture Management – ​​DSPM for short – is crucial for companies to ensure cyber resilience against the multitude ➡ Read more

Data encryption: More security on cloud platforms

Online platforms are often the target of cyberattacks, such as Trello recently. 5 tips ensure more effective data encryption in the cloud ➡ Read more