Introduction

TO CLOUD NATIVE APPLICATION PROTECTION PLATFORMS

The cloud has fundamentally changed the nature of modern applications, IT infrastructures, and processes. Cloud infrastructures provide the dynamic building blocks that allow development teams to rapidly spin up software and continuously deliver solutions to meet evolving customer and market needs. Modern applications built on open software supply chains, microservices, and cloud support business innovation but also create a dynamic and growing attack surface of interdependent workloads, services, and identities. To keep pace, cloud users are increasingly looking for a consolidated platform that addresses four functional requirements:

  • Vulnerability management
  • Posture management
  • Permissions & entitlement management
  • Threat detection & response

To boost effectiveness, organizations are adopting Cloud Native Application Protection Platforms (CNAPPs), like Sysdig, that combine functionality for Cloud Security Posture Management (CSPM), Cloud Workload Protection (CWP), Cloud Infrastructure Entitlement Management (CIEM), and Cloud Detection and Response (CDR) into one platform. By integrating these capabilities teams are able to avoid disconnects that occur with point solutions to manage risk without slowing down application delivery.

Cloud Security Platforms

Sysdig

Sysdig Secure for AWS

Sysdig helps companies secure and accelerate innovation in the cloud. Our roots are in runtime security built on Falco, the open standard for cloud threat detection created by Sysdig. Powered by Runtime Insights, our platform helps developers, DevOps, DevSecOps, and security teams understand what is running in production to focus on the risks that matter most.

Using Sysdig, you’ll be able to detect and stop attacks in real time, prioritize and fix vulnerabilities fast, reduce cloud security posture risk, and more effectively manage permissions.

In this workshop, you’ll experience how to implement cloud-native security for containers and Kubernetes with AWS solutions like Amazon Elastic Container Service (ECS), Amazon Elastic Kubernetes Service (EKS), and AWS Fargate, as well as manage and remediate misconfigurations with AWS cloud services such as Amazon S3, Amazon RDS, and AWS Lambda.

Workshop Modules

There are no dependencies between modules. The first two modules Prerequisites and 1. Install are required to complete the rest of the modules. Except of the 4.3 Fargate module, that does not require to follow the installation steps in 1. Install.

ModuleSubmoduleUse-caseDescriptionETA
PrerequisitesWorkshop setupPrerequisites to setup the workshop.20 min.
1. InstallTerraformDeploy Sysdig Secure for CloudDeploy the Sysdig Stack to secure your AWS workloads10 min.
 CloudFormationDeploy Sysdig Secure for CloudDeploy the Sysdig Stack to secure your AWS workloads10 min.
 Sysdig AgentsDeploy Sysdig Secure for k8s WorkloadsDeploy Sysdig Agents in EKS10 min.
2. Vulnerability ManagementECR Registry ScanningScan images from ECR automaticallyScan your ECR Registry images automatically20 min.
3. Security PostureCSPMCloud Security Posture ManagementInsights, Benchmarks and Compliance15 min.
4. Threat DetectionCloudTrailRuntime Cloud SecurityProtect your cloud environments at runtime.10 min.
 EKSRuntime Security for EKSProtect your AWS Managed k8s from runtime threats.15 min.
 FargateRunfime Security for FargateServerless Runtime Protection20 min.

If you run out of time in the workshop, don’t panic! These instructions are public and they are available after your workshop ends.

Workshop Cost

If you are using an account provided at an AWS event, the account will be cleaned up automatically. There are no AWS costs for you in this case.

If you are using your own AWS account, it may incur some costs. To minimize cost, make sure you deprovision and delete those resources when you are finished. You can find the instructions for how to do that under the Cleanup section under each different module.


³ Alba Ferri (Sysdig), 2021. CSPM, CIEM, CWPP, and CNAPP: Guess who in cloud security landscape.