Security News > 2021 > May > Sysdig adds detailed audit logs for runtime detection and response for AWS Fargate

Sysdig adds detailed audit logs for runtime detection and response for AWS Fargate
2021-05-05 00:15

With the announcement today, Sysdig launched the first runtime security detection and response solution for AWS Fargate that provides detailed audit logs to respond to incidents.

Sysdig's runtime detection for AWS Fargate is based on open source Falco, the runtime security tool created by Sysdig and contributed to the Cloud Native Computing Foundation.

New AWS Fargate security capabilities Runtime detection for AWS Fargate on Amazon ECS based on Falco: Sysdig provides deep runtime visibility for AWS Fargate using syscall data.

Security teams can use this data to detect threats, including suspicious file activity to address FIM requirements for customers that need to meet compliance frameworks, such as PCI. Sysdig also supports applications built using any language, including Go. Audit trails, rapid response, and capture files for AWS Fargate workloads: Sysdig adds the first detailed audit and response capabilities for AWS Fargate.

Teams only have to interact with this single entity versus keeping track of each AWS Fargate workload. How Sysdig collaborates with AWS. "As we continue to evolve AWS Fargate, giving customers different approaches to security has been important to us. Open source Falco has strong momentum and with its syscall approach, it's designed to provide comprehensive AWS Fargate threat detection."

"We have worked with Sysdig on this integration with the ultimate goal of giving AWS Fargate users deeper visibility to manage risk," said Fernando Zandona, General Manager, Serverless Containers, AWS. With early access to AWS Fargate 1.19 last year, the Sysdig team worked on a series of Falco optimizations.


News URL

http://feedproxy.google.com/~r/HelpNetSecurity/~3/0Ojg7Q9O8Us/