Knowledge Flashcards
CNAPP’s provide…
Full coverage and visibility into cloud estates and can detect security and compliance risks across tech stack
Includes cloud configs, workload and identity
Holistic views of attacks, correlating low severity risks to dangerous attack vectors
CNAPP solves challenges of:
Gaps in coverage from traditional security tools that require agents on all workloads
Difficulties in deploying and maintaining scanners and agents
Alert fatigue caused by ineffective risk prioritization
Multiple tools creating overhead for security teams
SideScanning
Trademarked tech that collects data, with read-only access from the workloads runtime block storage and retrieves cloud configuration metadata via API’s
This allows Orca to detect vulnerabilities, malware, misconfigurations, lateral movement risk, weak and leads passwords, unsecured PII all without sending a single packet over the network or running a single line of code in the environment
No performance impact to workloads
Read-only access
Orca detects and prioritizes these Top Risks
Vulnerabilities
Misconfigurations
Malware
Misplaced Sensitive Data
Lateral Movement Risk
Authentication Risk
Orca’s Unified Data Model context engine…
combines the intelligence gathered from deep inside workloads host configurations and cloud configuration details to build a unified data model
This allows Orca to build a visual map of cloud estates, including interconnectivitiy between assents
Orca’s visual map of cloud estates…
surfaces the critical security issues and root cause without overwhelming security team with thousands of meaningless alerts
Automated Cloud Compliance…
Orca maintains continuous compliance with over 40 (65) regulatory and industry frameworks and key CIS benchmarks
Includes PCI-DSS, SOC2, PSD2, GDPR, NIST-800-53, ISO 27001, HIPAA and more
Customizable templates to meet teams specific needs and focus on audit readiness
Benefits of CNAPP
Reduce the change of misconfigs, mistakes or mismanagement of cloud-native apps
Reduce the number of tools and vendors involved in the CI/CD pipeline
Reduce complexity and costs associated with creating secure and compliant cloud-native apps
Allow security departments to understand attack paths based on relationships (Vulnerabilities, misconfigs, permissions, exposed secrets, etc) that would enable attacker to target apps
Bi-directionally link development and ops visibility and insight into risk analysis to improve overall enterprise security posture
Why Orca
Agentless = 100% coverage and visibility
Deploy once - Secure forever
Detect risks missed by other solutions
Effective alert prioritization
Multi-cloud support
Multiple tools in a single platform
Orca Agentless means…
Orca eliminates the gaps in coverage, organizational friction, performance hits and high operational costs of agent-based solutions
Orca 100% coverage and visibility means…
Orca provides full-stack visibility and covers all your cloud assets within minutes
Includes:
- VM’s
- Containers
- Serverless
- Cloud infrastructure resources
Orca Effective alert prioritization means…
Orca’s context aware engine prioritizes the 1% of alerts that truly matter and need immediate attention
Multiple tools in a single platform means…
Core capabilities of CSPM, CWPP, including vulnerability management and compliance management
Deploy once - Secure forever means…
Orca automatically detects and monitors new cloud assets as you add them without requiring manual updates
Detect risks missed by other solutions means…
Orca leverages context aware intelligence to recognize when seemingly unrelated issues can be combine to create dangerous attack paths
Multi-cloud support means…
Orca is an enterprise-scalable platform that can secure large multi-cloud estates efficiently with low-overhead