The key highlights of this release are:
CSPM (Cloud Security & Posture Management):
User Management
RBAC – The support for RBAC controls at the account group level. You can limit the access of users and administrators to a specific account group(s). Users can also set their default view across all C3M Dashboards by selecting their preferred cloud accounts or account groups.
Security Governance
CQL on AWS Policy Conditions – You can define CQLs on the conditions in Policy Statements.
E.g., CMK should not have policyStatement with [condition with [operator = ‘Bool’ and opKey = ‘kms:GrantIsForAWSResource’ and opValue = ‘true
Enriched Resource-Specific View – You can see both predefined and custom policy alerts for each violating resource.
New Policies – Added new policies on GCP, AWS, and Azure.
Automation
GCP Playbooks – GCP playbooks support to extend our SOAR offering. You can leverage our predefined actions and configure auto-remediations for GCP policy violations. Playbooks are based on a serverless framework, and you need to deploy the remediation module in a designated GCP project.
- Alerts - Ability to search by a Policy Name (Predefined or Custom), Alert ID, or region.
- Inventory Summary - Visibility to all your compliant and non-compliant resource locations in a geo-map with additional filters on the resource type.
- New Cloud accounts listing page - Ability to filter monitored accounts on various attributes like - sync status, type, mode, etc.
CIEM (Cloud Infrastructure Entitlement Management):
Visibility
New IAM Overview Dashboard – Visibility into your IAM specific alerts, privileged identities, over-provisioned members, broad access resources, top 5 IAM alerts, and much more.
- Single-pane of glass view to visualize your IAM identities and their usage pattern. You can filter on identity types like users, groups, or service accounts and get insights into their used and unused permissions in the last 90 days. You can use this to enforce least privilege access on your IAM identities.
- You can also search for any permission across multiple projects and check if that permission is used or not in a specific period.
- Real-time visibility into all IAM Activities across your multi-cloud environments.
- Audit recent access changes across your cloud accounts.
- Geo-graphical representation of failed and successful events.
- Know the sensitive events across your multi-cloud environments.
- Audit configuration changes on violating cloud resources using our new timeline view.
For more details please reach out to us