Emsi Demonstrates Proof of Compliance with Fugue
How to detect security and compliance risks on an ongoing basis and streamline audit processes for AWS resources
Ensure continuous compliance and security within a complex AWS and Microsoft Azure infrastructure
How does a global crowdfunding community rapidly migrate PCI-regulated applications to the cloud while preserving partner trust?
CCoE Delivers Security and Compliance with Fugue
Media Company: Relying on Cloud GRC Team to Secure Cloud Operations
Fugue Cloud Security and Compliance
Fugue’s SaaS product and open source tools provide immediate visibility into AWS, Azure, and Google Cloud environments, and identify potential misconfiguration and compliance violations - before and after resources are deployed.
Fugue Visualizer
With the Fugue visualizer, DevOps teams, security engineers, and compliance analysts can auto-generate visual diagrams of their cloud resources.
Fugue for AWS
AWS IaaS and PaaS tools have created challenges for teams responsible for managing compliance and security risks.
Fugue for Azure
Fugue ensures that your Azure infrastructure stays in continuous compliance with enterprise security policies.
PCI Compliance Made Easy With Fugue
If your organization accepts or processes payment cards, PCI DSS applies to you.
SOC 2 Compliance with Fugue
Developed by the AICPA, SOC 2 is designed to address how organizations should design systems of internal controls to address the security, availability, processing integrity, confidentiality, and privacy of customer data.
Engineer's Handbook on Cloud Security
This handbook is a comprehensive guide for understanding misconfiguration and why it’s so pervasive — and how hackers exploit these often hidden vulnerabilities.
A Comprehensive Guide to Preventing Cloud Misconfiguration
Cloud misconfiguration is the biggest security risk for the modern enterprise. If left unattended, it can open your organization up to unforeseen security risks.
Guidebook to Achieving SOC 2 Compliance for Cloud Infrastructure
For any organization that holds, stores, or processes customer data in the cloud, SOC 2 compliance is necessary. Why is it important? How is it different than SOC 1 compliance? How do you achieve SOC 2 compliance?
An Enterprise Guide to PCI Compliance
In this guidebook, we are going to break down the complexities associated with PCI and discuss the requirements for enterprises to be PCI compliant.
Executive Guide to Cloud Security
This guide discusses how the cloud’s programmable nature fundamentally changes how one should think about cloud security. It requires executives to have a different mindset and understanding of computing.
Best Practices to Ensuring Compliance with Baselines
As organizations increase their cloud footprint, they will need continuous visibility into their cloud environments to prevent unauthorized changes from causing security breaches. One of the ways to gain visibility into your cloud infrastructure is with baselines.
Cloud Misconfiguration: Biggest Security Risk to Enterprises
Data breaches due to cloud infrastructure misconfiguration are one of the biggest risks to organizations in the cloud.
Fugue Product Tour
Learn how Fugue prevents cloud misconfiguration and ensures continuous compliance with enterprise security policies in this short product tour.
AWS Environment Discovery and Visualization
How to use Fugue to discover and visualize all the cloud resources you have running and how they are configured.
Baselining Your AWS Environment & Detecting Drift
How to use Fugue to baseline your cloud configurations and detect drift.
Baseline Enforcement
In cloud environments, enterprises face an increased likelihood of configuration and policy compliance violations—which may lead to security breaches, system downtime, and data loss.
SOC 2 Compliance for Your AWS
How to use Fugue to get your cloud configurations SOC 2 compliant.
Unraveling the Pitfalls of Soc 2 Audits
SOC 2 applies to any organization that stores or processes customer data in the cloud. How can organizations best prepare for their SOC 2 audit?
Building a Highly Secure S3 Bucket Part I
In this masterclass, you'll gain a deeper understanding of S3 and how to think critically about cloud security for your specific use cases.
Building a Highly Secure S3 Bucket Part II
In this Cloud Security Masterclass, Fugue digs deeper into three critical components of S3 security to help you think critically about security for your unique AWS use cases.
Locking Down the Security of AWS IAM
Recent high-profile cloud-based data breaches have involved advanced cloud misconfiguration attacks exploit IAM misconfigurations that compliance controls and security professionals often miss.
Securing Serverless
In this Cloud Security Masterclass session, we dig into how security is different for serverless cloud infrastructure environments —and what hasn’t changed.
A Conversation with Greg McCord (CalAmp)
A discussion with Greg McCord, Global Head of Information Security at CalAmp, about the Internet-of-Things (IoT), cloud-native architecture, and edge computing, and how they affect IT cloud security.
A Live Chat with Red Ventures/ AWS and Fugue
In this talk, James Huston (Red Ventures), Jon Myer (AWS), and Josh Stella (Fugue) discuss how cloud-native architectures that leverage AWS services such as Lambda and Step Functions can minimize your cloud attack surface, streamline security audits, and benefit your end customers.
Cloud Security for Newly Distributed Engineering Teams
Tips and strategies on how to avoid the common pitfalls of remote teams.
Automating Cloud Security with Open Policy Agent
In this webinar, you will learn how to utilize Open Policy Agent (OPA), an open source policy as code framework, to secure your cloud environments.
Open Source Policy-as-Code for all the Things
Open Policy Agent (OPA) has emerged as a leading framework for policy-as-code. In this webinar, you will learn how OPA works and the myriad of advantages of choosing OPA.
Live Simulation of Cloud Misconfiguration Attacks
Advanced attacks that exploit a common cloud misconfiguration vulnerabilities with VPCs, IAM, and other services are easily missed by security teams and compliance frameworks.
Integrating Infrastructure Security and Compliance into CI/CD
Application teams are increasingly moving security and compliance checks earlier in the software development life cycle (SDLC), when corrective changes are easier and faster to make.
Remediating Cloud Security Issues: Automation Scripts vs. Self-Healing Infrastructure
This webinar focuses on two common approaches to automated remediation: lambda functions vs. self-healing infrastructure and their effectiveness in managing cloud misconfiguration risk, impact on cloud operations, and ROI.
Shifting Left on Infrastructure Security and Compliance
This webinar explores using cloud environment baselining as the mechanism for shifting left on infrastructure security and compliance.
[Fugue + CSA] Preventing AWS Misconfiguration and the Risk of Data Breaches
Watch this webinar to learn how to secure critical data and ensure that your AWS environments always adhere to policy—without deploying an army of cloud security engineers.
Cloud Misconfiguration Risk: What You Need to Know to Prevent Critical Breaches
Watch this webinar to gain a better understanding of cloud infrastructure misconfiguration, a major risk to any enterprise adopting the cloud and scaling cloud operations.
SOC 2 standard applies to any organization that stores or processes customer data in the cloud. How can organizations best prepare for their SOC 2 audit?
Security Threats Posed by Orphaned Cloud Resources
Orphaned cloud resources represent significant risks of misconfiguration and data breaches. A long-forgotten EC2 instance or VPC may contain OS vulnerabilities that hackers can use to gain access to your cloud environments.
Simulating Misconfiguration Attacks: S3 Exploits
Amazon S3 object storage service is easy to use, extremely reliable, and incredibly popular, but it’s also a service that’s easy to get wrong.
Simulating Cloud Misconfiguration Attacks: AWS IAM
AWS Identity and Access Management (IAM) misconfiguration has become a primary attack vector for bad actors seeking to breach data on AWS. Even the most security-conscious cloud engineers can inadvertently misconfigure IAM services resulting in privilege escalation attacks or unauthorized account access.
Simulation of Insider Threat Attacks on AWS
Misconfigured cloud resources can empower malicious insiders with the ability to do real damage to your organization. Ill-intentioned employees and contractors have an added advantage over outsiders: better means of discovering, accessing, and exploiting cloud resources.
Simulating Cloud Misconfiguration Exploits: Hacking Database Snapshots on AWS
Securing production databases on AWS is a top priority for cloud and security teams, but less attention is paid to preventing the kinds of alternative attack vectors we've seen in the news recently. One scenario involves building new databases from backup snapshots to steal data without detection.
Live Simulation of an Advanced Cloud Misconfiguration Exploit
Recent high-profile cloud breaches involve advanced tactics that took advantage of multiple resource misconfigurations to gain entry to environments, discover resources, move laterally, and extract data—all without detection. They don’t typically break compliance rules, and security teams won’t likely recognize them as vulnerabilities.
Bringing Your Cloud Into Compliance and Proving It
In this masterclass session, Fugue co-founder and CTO Josh Stella and Dave Williams, Cloud Architect at New Light Technologies, walk through a tried-and-true process for achieving cloud compliance that works for any cloud team, any cloud environment, and any compliance regime.
Locking Down the Security of AWS IAM Part II
In this masterclass, Fugue CTO Josh Stella digs into AWS IAM to help you think more critically about security for your AWS use cases. You’ll understand how to identify AWS IAM misconfiguration vulnerabilities you’ve missed before—and the risks they pose.
The State of Cloud Security 2020 Report
Fugue surveyed 300 cloud professionals to gain insights into misconfigurations and cloud security during the COVID-19 crisis.
Cloud Infrastructure Security and Compliance Report
Download this survey for insights into what 300 organizations feel about their cloud operations, level of maturity, and security and compliance challenges as they migrate their infrastructure to the cloud.
Cloud Infrastructure Misconfiguration Report
Download this survey for insights into enterprises' cloud operations and how they view and manage misconfiguration risk.
The State of Cloud Security 2020
Cloud security concerns of newly distributed teams.
4 Benefits to Visualizing Your Cloud Infrastructure
4 benefits to visualizing your cloud infrastructure
DevOps Teams: Beware the Security Risk of Cloud Zombies
Zombie cloud resources, by definition, are not tracked by cloud and security teams, and pose real security misconfiguration risk.
Requirements for PCI Compliance in the Cloud
Of the total 12 requirements and 6 goals in PCI DSS, the following are the most relevant for compliance an
Cloud Security: Four Key Practices to Get Started
Best practices for securing your cloud infrastructure
Approaches to Cloud Security
An increasingly common approach to speed up remediation is to use AWS Lambda or Azure Functions. In this infographic, we explore another approach.
7 Things to Remember About Baselines
Baselines are another way to manage cloud configuration drifts. Here are 7 things to remember about baselines.
Data Breaches Due to Cloud Misconfiguration
A look at some of the most common cloud misconfiguration and the resulting data breaches
Best Practices for Preventing Cloud Misconfiguration
Five best practices for preventing cloud misconfiguration
Cloud Revolution
"I'm seeing a lot of cloud configuration errors in the real world - and it's scaring the hell out of me."
Results of Cloud Misconfiguration Survey
What we learned from surveying 300 organizations about their cloud environment