Paladin Cloud v3.0.1 releases: an extensible, Security-as-Code (SaC) platform

Paladin Cloud

Paladin Cloud is an extensible, Security-as-Code (SaC) platform designed to help developers and security teams reduce risks in their cloud environments. It functions as a policy management plane across multi-cloud and enterprise systems, protecting applications and data. The platform contains best-practice security policies and performs continuous monitoring of cloud assets, prioritizing security violations based on severity levels to help you focus on the events that matter..

Its resource discovery capability creates an asset inventory, then evaluates security policies against each asset. Powerful visualization enables developers to quickly identify and remediate violations on a risk-adjusted basis. An auto-fix framework provides the ability to automatically respond to policy violations by taking predefined actions.

Paladin Cloud is more than a tool to manage cloud misconfiguration. It’s a holistic cloud security platform that can be used for continuous monitoring and reporting across any domain.

Extend your Coverage

Paladin Cloud’s plugin-based connector architecture allows for data ingestion from multiple sources. Plugins allow you to pull data from various cloud-based enterprise systems, such as Kubernetes management, API gateways, and threat intelligence systems in order to holistically manage cloud security. Examples include Qualys Vulnerability Assessment Platform, Bitbucket, TrendMicro Deep Security, Tripwire, Venafi Certificate Management, and Redhat. You can write rules based on data collected by these plugins to get a complete picture of your cloud security posture.

How Does It Work?

Assess -> Report -> Remediate -> Repeat

Paladin Cloud constantly assesses and monitors your cloud security posture on a near real-time basis. The platform discovers assets, evaluates policy, creates issues for policy violations, and prioritizes remediation. If an auto-fix is configured with the policy, those auto-fixes are executed when the resources fail the evaluation. Policy violations can not be closed manually; the issue must be fixed on the inspected asset, and then Paladin Cloud will mark it closed in the next scan.

Exceptions can be added to policy violations. Sticky exceptions (exceptions based on resource attribute matching criteria) can be added to exempt similar resources that may be created in the future. Note that exceptions should be used sparingly and only if they are aligned with corporate security guidelines.

Asset groups are a powerful way to visualize cloud security and compliance. Asset groups are created by defining one or more target resource’s attribute-matching criteria. For example, you could create an asset group of all running assets by defining criteria to match all EC2 instances with attribute instancestate.name=running. Any new EC2 instance launched after the creation of an asset group will be automatically included in the group.

In the Paladin Cloud UI, you can select the scope of the portal to a specific asset group. All the data points shown in the UI will be confined to the selected asset group. It is common practice to create asset groups per account (or subscription, project), per application, per business unit, or per environment.

Asset groups are not just for setting the scope of the data shown in the UI. The groups can be used to scope rule execution as well. Policies contain one or more rules. These rules can be configured to run against all resources or a specific asset group. The rules will evaluate all resources in the asset group configured as the scope for the rule. This provides an opportunity to write policies that are very specific to an application or organization.

A good example is when some teams would like to enforce additional tagging standards beyond the global requirements. They implement this policy with their custom rules and configure it to run only on their assets.

Paladin Cloud Key Capabilities

  • Continuous asset discovery
  • Continuous security policy evaluation
  • Detailed reporting
  • Auto-Fix for policy violations
  • Ability to search all discovered resources
  • Simplified policy violation tracking and prioritization
  • Easy to use Self-Service portal
  • Custom policies and custom auto-fix actions
  • Dynamic asset grouping to view compliance
  • Ability to create multiple compliance domains
  • Exception management
  • Email digests
  • Supports unlimited AWS, Azure, and GCP accounts
  • Completely automated installer
  • OAuth2 Support
  • Azure AD integration for login
  • Role-based access control

Changelog v3.0.1

UI Changes

  • Fixed bugs across the application
  • Enhanced the filtering on UI list views

Policy Updates

  • Added 3 Azure and 2 GCP cost policies
  • Updated the Policy documentation
  • Enhanced the Policy implementation for a few policies.
  • Other minor policy fixes and updates
  • Updated the resolution links for all the policies to point to appropriate descriptions

Other Updates

  • Fixed bugs related to Azure and GCP autofix functionality

What’s Changed

Install & Use