Security and compliance tooling to audit and monitor cloud compliance and security configuration
Programmatically Validate Cloud Security
Dash libraries allow organizations to configure security profiles and confirm the security configuration of AWS resources with a single line of code.
Dash provides data on passing and failing scans and AWS resources that fall out of compliance with baseline settings. Enforce cloud security configuration and validate safeguards for:
Users and Roles Permissions
Encryption
Audit Logging
Networking Configuration
Backup & Disaster Recovery
Set A Security Baseline Around Your Compliance Needs
Dash provides cloud security and compliance scanning for AWS cloud resources. Security teams can use Dash security auditing libraries to enforce high security standard. Dash security inspection connects into your organization’s set security controls and has security baseline inspection built around:
AWS Best Security Practices
HIPAA/HITECH
SOC
NIST CSF
HITRUST
Detect Cloud Security Issues During Configuration and Application Builds
Dash scanning can be connected into your team’s configuration and build process. Teams can run Dash scans as a security and compliance validation step when provisioning new AWS infrastructure with tools such as Terraform.
For Popular Programming Languages
Use CloudInspect wrapper libraries to dynamically run AWS cloud security scans, enforce baseline security settings and write custom security workflows.
Dash provides security baselines around established compliance standards including HIPAA, SOC, NIST, and ISO. Organizations can use Dash scans to maintain compliance through mapped security programs. Below are a sample of connected security controls.
HIPAA Security Controls
164.312(a)(2)(iv) Encryption and Decryption
Ensure that all cloud data volumes, cloud databases, and transmitted data is encrypted.
164.308(a)(4)(i) Information Access Management
Ensure that your company uses proper user roles and policies in AWS. Avoid HIPAA violations stemmed from access issues.
164.308(a)(7)(i) Protection from Malicious Software
Ensure that cloud network and security groups do not expose ports or access that may compromise PHI.
SOC Security Controls
CC5.1 Logical Access
Ensure that software, infrastructure, and architecture is implemented to enforce authentication, restrict user access and prevent unauthorized access
CC5.4 Access Modification / Removal
Ensure that access to data, software, and IT resources is authorized and is modified or removed based on roles, responsibilities, or the system design.
CC5.7 Transmission Security
Ensure that transmission, movement, and removal of information is restricted and protected during transmission.
Security Configuration Monitoring for AWS
Set Security Controls and Compliance Configuration For AWS Cloud Services Including:
Amazon EC2
Amazon Lambda
Amazon S3
Amazon RDS
Amazon Redshift
Amazon CloudWatch
Amazon Cloudtrail
Amazon DynamoDB
Amazon IAM
Amazon ECS
Request Early Access
Dash CloudInspect is currently in early preview. Dash provides teams with security libraries for scanning, monitoring, and enforcement for cloud security baselines. Teams can streamline regulatory compliance and resolve compliance issues with ease.