Security News > 2021 > December > Open source cloud native security analyzer Terrascan embeds security into native DevOps tooling
Tenable enhanced Terrascan, an open source cloud native security analyzer that helps developers secure Infrastructure as Code.
"It's now more critical than ever for developers to have tools that can detect compliance and security violations across their entire cloud systems, including IaC," said Nico Popp, chief product officer, Tenable.
"Just as IaC opens the door to programmatically embed policy checks earlier in the development lifecycle, Terrascan detects compliance and security violations across IaC to mitigate risk before provisioning. We are committed to ensuring Terrascan remains open and available to all development teams and are excited to contribute to its growth."
New Terrascan features The ability to identify security risks in more IaC and container definition formats.
Terrascan delivers a scalable way to ensure that cloud infrastructure configuration adheres to evolving security best practices.
Terrascan fundamentally enhances the value of IaC used by organizations to define and manage cloud infrastructure, and improves security by enabling teams to eliminate risk before infrastructure is deployed.
News URL
https://www.helpnetsecurity.com/2021/12/02/terrascan-open-source-security-analyzer/
Related news
- How AI Is Changing the Cloud Security and Risk Equation (source)
- Osmedeus: Open-source workflow engine for offensive security (source)
- Am I Isolated: Open-source container security benchmark (source)
- Strategies for CISOs navigating hybrid and multi-cloud security (source)
- Powerpipe: Open-source dashboards for DevOps (source)
- ScubaGear: Open-source tool to assess Microsoft 365 configurations for security gaps (source)
- Debunking myths about open-source security (source)
- Enhancing visibility for better security in multi-cloud and hybrid environments (source)
- AxoSyslog: Open-source scalable security data processor (source)
- Microsoft Fixes AI, Cloud, and ERP Security Flaws; One Exploited in Active Attacks (source)