Browse our library of content
[Webinar] Integrating Infrastructure Security and Compliance Into CI/CD
Application teams are increasing their deployment velocity by moving security and compliance checks earlier in the software development life cycle (SDLC), when corrective changes are easier and faster to make.
[eBook] Cloud Infrastructure Security & Compliance Report
Fugue surveyed 300 organizations across a broad number of industries about their cloud operations, level of maturity, and security and compliance challenges as they migrate their infrastructure to the cloud
[Webinar] Simulating Misconfiguration Attacks: S3 Exploits on AWS
If you use Amazon Web Services (AWS), chances are the S3 object storage service gets a lot of use. It’s easy to use, extremely reliable, and incredibly popular. But it’s also a service that’s easy to get wrong, and data breaches related to S3 misconfigurations have become all too commonplace.
Guidebook to Achieving SOC 2 Compliance for Cloud Infrastructure
For any organization that holds, stores, or processes customer data in the cloud, SOC 2 compliance is necessary. What is SOC 2? Why is it important? How is it different than SOC 1 compliance? How do you achieve SOC 2 compliance?
An Enterprise Guide to PCI Compliance
In this guidebook, we are going to break down the complexities associated with PCI and discuss the requirements for enterprises to be PCI compliant.
A Comprehensive Guide to Preventing Cloud Security Misconfiguration
Cloud misconfiguration is the biggest security risk for the modern enterprise. If left unattended, it can open your organization up to unforeseen security risks.
Best Practices to Ensuring Compliance with Baselines
As organizations increase their footprint to leverage cloud computing for increased application deployment velocity and scalability, they will need to have continuous visibility into their cloud environments in order to prevent unauthorized changes from causing additional threats and security breaches. One of the ways to gain visibility into your cloud infrastructure is with baselines.
Cloud Misconfiguration Breaches: Biggest Security Risk to Enterprises
Data breaches due to cloud infrastructure misconfiguration are one of the biggest risks to organizations in the cloud.
Automating Cloud Security with Open Policy Agent
Checking infrastructure as code, such as Terraform, for security and compliance before infrastructure deployment is becoming a critical part of the DevSecOps toolkit. Open Policy Agent (OPA) is an open source policy as code framework commonly used validating Kubernetes and public cloud compliance.
Open Source Policy-as-Code for all the Things
Open Policy Agent (OPA) has emerged as a leading framework for policy-as-code. In this webinar, you will learn how OPA works and the myriad of advantages of choosing OPA.
Live Simulation of Cloud Misconfiguration Attacks
We've moved beyond simple S3 misconfigurations and into more advanced attacks that exploit a common cloud misconfiguration vulnerabilities with VPCs, IAM, and other services, many of which are easily missed by security teams and compliance frameworks.
Integrating Infrastructure Security and Compliance into CI/CD
Remediating Cloud Security Issues: Automation Scripts vs. Self-Healing Infrastructure
In this on-demand webinar, we will focus on two common approaches to automated remediation: lambda functions vs. self-healing infrastructure.Josh Stella, co-founder and CTO of Fugue, will explore both approaches in depth to compare their effectiveness in managing cloud misconfiguration risk, their impact on cloud operations, and a brief ROI analysis.
Shifting Left on Infrastructure Security and Compliance
In this webinar, we’re going to explore using cloud environment baselining as the mechanism for shifting left on infrastructure security and compliance.
[Fugue + CSA] Preventing AWS Misconfiguration and the Risk of Data Breaches
Today's enterprise needs to move fast at scale in the cloud, but the dynamic and complex nature of the cloud has introduced a significant new risk: a data breach due to misconfiguration and human error. In large enterprise cloud environments, it's not uncommon to have making infrastructure decisions concerning tens of thousands of resources spanning hundreds of AWS accounts. This creates a challenge for security and compliance teams: How can you ensure critical data is secure and your AWS environments always adhere to policy—without deploying an army of cloud security engineers?
Cloud Misconfiguration Risk: What You Need to Know to Prevent Critical Breaches
Watch this webinar to gain a better understanding of cloud infrastructure misconfiguration, a major risk to any enterprise adopting the cloud and scaling cloud operations. What is cloud misconfiguration? Why it is so pervasive? And why does it present such a critical risk to the enterprise? This video discusses how we need to think differently about the problem in order to effectively address it.
Unraveling the Pitfalls of Soc 2 Audits
With organizations rapidly increasing their cloud footprint, ensuring SOC 2 compliance is essential. The standard applies to any organization that stores or processes customer data in the cloud. How can organizations best prepare for their SOC 2 audit?
Security Threats Posed by Orphaned Cloud Resources
Orphaned cloud resources, typically left over from development or maintenance, represent significant risks of misconfiguration and data breaches. A long-forgotten EC2 instance or VPC may contain OS vulnerabilities or overly permissive security group rules that hackers can use to gain access to your cloud environments.
Simulating Misconfiguration Attacks: S3 Exploits
Simulating Cloud Misconfiguration Attacks: AWS IAM
AWS Identity and Access Management (IAM) misconfiguration has become a primary attack vector for bad actors seeking to breach data on AWS. Even the most security-conscious cloud engineers can inadvertently misconfigure IAM services resulting in privilege escalation attacks or unauthorized account access.
Simulation of Insider Threat Attacks on AWS
Misconfigured cloud resources can empower malicious insiders with the ability to do real damage to your organization. Ill-intentioned employees and contractors have an added advantage over outsiders: better means of discovering, accessing, and exploiting cloud resources.
Simulating Cloud Misconfiguration Exploits: Hacking Database Snapshots on AWS
Securing production databases on AWS is a top priority for cloud and security teams, but less attention is paid to preventing the kinds of alternative attack vectors we've seen in the news recently. One scenario involves building new databases from backup snapshots to steal data without detection.
Live Simulation of an Advanced Cloud Misconfiguration Exploit
Recent high-profile cloud breaches involve advanced tactics that took advantage of multiple resource misconfigurations to gain entry to environments, discover resources, move laterally, and extract data—all without detection. They don’t typically break compliance rules, and security teams won’t likely recognize them as vulnerabilities.
Cloud Infrastructure Security and Compliance Report
Fugue surveyed 300 organizations across a broad number of industries about their cloud operations, level of maturity, and security and compliance challenges as they migrate their infrastructure to the cloud.
Cloud Infrastructure Misconfiguration Report
Fugue surveyed IT, Cloud, Security and Compliance professionals from more than 300 organizations across a broad number of industries about their cloud operations and how they view and manage misconfiguration risk.
NLT Technologies: Keeping Cloud Environment Secure and Compliant with Fugue
New Light Technologies (NLT) is an IT and GIS services company that helps organizations such as the World Bank and US Census Bureau modernize their infrastructure in the cloud. NLT partners with Fugue to prevent cloud misconfiguration and deliver continuous compliance for their customers’ Amazon Web Services and Microsoft Azure infrastructure.
SparkPost: Streamlines AWS Security and Compliance
SparkPost is the leading email delivery and analytics provider that sends more than 5 trillion messages annually, representing more than 37% of the world’s business email. SparkPost provides customers with actionable, real-time data to drive engagement and ROI.
GlobalGiving: Ensuring PCI Compliance in AWS
GlobalGiving, the largest global crowdfunding community that connects nonprofits, donors, and companies, utilizes Fugue to ensure PCI-regulated workloads in AWS are compliant.
CCoE Delivers Security and Compliance with Fugue
Fugue works with a multinational digital marketing and commerce company possessing a broad portfolio of consumer and enterprise properties to establish SOC2 and PCI requirements for its applications and infrastructure.
Media Company: Relying on Cloud GRC Team to Secure Cloud Operations
Fugue works with a national media company that produces content for millions of consumers worldwide to help establish cloud security best practices.
Fugue Autonomous Cloud Security & Compliance
Fugue ensures cloud infrastructure stays in continuous compliance with enterprise security policies.
Visualizing your cloud resources does not need to be complex and laborious. With the Fugue visualizer, DevOps teams, security engineers, and compliance analysts can auto-generate visual diagrams of their cloud resources.
Fugue for AWS
AWS IaaS and PaaS tools have enabled enterprises to dramatically increase application deployment velocity and scalability. However, the programmatic and dynamic capabilities of cloud computing create challenges for teams responsible for managing compliance and security risks.
Fugue for Azure
Azure IaaS and PaaS tools have enabled enterprises to dramatically increase application deployment velocity and scalability. Fugue ensures that your Azure infrastructure stays in continuous compliance with enterprise security policies.
PCI Compliance Made Easy With Fugue
Organizations that handle credit card information must be compliant with PCI Data Security Standards (PCI), a compliance standard for protecting payment cardholder data. If your organization accepts or processes payment cards, PCI applies to you.
SOC 2 Compliance with Fugue
Developed by the AICPA, SOC 2 is designed to address how organizations should design systems of internal controls to address the security, availability, processing integrity, confidentiality, and privacy of customer data.
NIST 800-53 Compliance
Fugue can enforce NIST 800-53 compliance for cloud infrastructure and reduces time-to-ATO to enable speed-to-mission and improve operational efficiencies.
Mean Time to Remediation: Why CISOs Should Care
The risks due to misconfigurations can be severe for organizations: steep regulatory fines, loss of customer data, and damage to your brand. Mean Time to Remediation (MTTR) is the key security metric that every CISO should care about.
4 Benefits to Visualizing Your Cloud Infrastructure [infographic]
4 benefits to visualizing your cloud infrastructure
DevOps Teams: Beware the Security Risk of Cloud Zombies [Infographic]
The number one cause of data breaches in the cloud is misconﬁguration. Yet, zombie cloud resources, by definition, are not tracked by cloud and security teams, posing real security misconfiguration risk.
Requirements for PCI Compliance in the Cloud [Infographic]
Of the total 12 requirements and 6 goals in PCI DSS, the following are the most relevant for compliance an
Cloud Security: Four Key Practices to Get Started [infographic]
Best practices for securing your cloud infrastucture
Approaches to Cloud Security [infographic]
Manually ﬁxing cloud infrastructure to correct security and compliance issues is just too slow and error-prone. An increasingly common approach to speed up remediation is to use AWS Lambda or Azure Functions. In this infographic, we look at another approach.
7 Things to Remember About Baselines [infographic]
Baselines are another way to manage cloud configuration drifts. Here are 7 things to remember about baselines.
Data Breaches Due to Cloud Misconfiguration [infographic]
A look at some of the most common cloud misconfiguration and the resulting data breaches
Best Practices for Preventing Cloud Misconfiguration [infographic]
Five best practices for preventing cloud misconfiguration
Cloud Revolution [infographic]
"I'm seeing a lot of cloud configuration errors in the real world - and it's scaring the hell out of me."
Results of Cloud Misconfiguration Survey [infographic]
What we learned from surveying 300 organizations about their cloud environment
Fugue Product Tour
Learn how Fugue prevents cloud misconfiguration and ensures continuous compliance with enterprise security policies in this short product tour.
AWS Environment Discovery and Visualization
How to use Fugue to discover and visualize all the cloud resources you have running and how they are configured.
Baselining Your AWS Environment & Detecting Drift
How to use Fugue to baseline your cloud configurations and detect drift.
In cloud environments, enterprises face an increased likelihood of configuration and policy compliance violations—which may lead to security breaches, system downtime, and data loss. This happens because cloud deployments are becoming more complex to provision and manage.
SOC 2 Compliance for Your AWS
How to use Fugue to get your cloud configurations SOC 2 complaint.