Login
Sonrai Security website logo for identity and data governance and cloud security

Sonrai Security Introduces Automation Engine for Identity and Data Governance in the Cloud

Author: Sonrai Security Marketing | Date: July 28, 2020
Read Time: 3 minutes

Industry-first identity and data graph and “swimlane” workflows enable comprehensive security across AWS, Azure, GCP and other public clouds

New York -- July 28, 2020 -- Sonrai Security, a leader in identity and data governance, today announced the Governance Automation Engine for Sonrai Dig, re-inventing how customers ensure security in AWS, Azure, Google Cloud and Kubernetes by automatically eliminating identity risks and reducing unwanted access to data. This enables enterprise companies to achieve and maintain least privilege, enforce separation of duties, eliminate complex identity risks and lock down critical data. Workflow and role-based swimlanes route alerts and recommend actions to cloud, security, audit or DevOps teams, or deploy remediation bots to address security issues.

The new Governance Automation Engine helps enterprises address critical pain points including security breaches caused by identity policy misconfiguration and data risks that go beyond S3 buckets. It extends to include databases like Amazon RDS, DynamoDB, CosmosDB and many others, addressing disconnects among cloud, security, audit and DevOps teams with widely disparate cloud security toolsets.

"The acceleration of migrations from on-prem datacenters to the cloud presents an entirely new set of challenges for global enterprises that cannot be fully addressed by the security approaches of the past,” said Richard Stiennon, chief research analyst, IT-Harvest. “Security for public clouds must center on effective governance and security of three critical control points -- identities, data and platform -- to understand, monitor and minimize risk. Effective solutions will be those that go well beyond simply presenting dashboards of cloud provider tools and bring entirely new identity and data analytics to the mix.” 

Cloud Security Complexity 
For enterprise organizations, public cloud expansion quickly leads to hundreds of cloud accounts, thousands of data stores and tens of thousands of ephemeral pieces of compute involving multitudes of development teams. Improperly set up, this growing array of interdependencies and inheritances can open up many security risks such as over-permissioned identities, separation of duties risks and excessive access paths to critical data. Legacy cloud security tools have failed to address identity and data complexity and either miss critical vulnerabilities or send continuous alarms, creating high levels of noise that overwhelm security teams’ resources and lead to inaction. 

Sonrai Dig 
The Sonrai Dig platform builds a comprehensive graph detailing every relationship between identities (people and non-people) and data that exist within cloud platforms like AWS, Azure, GCP and Kubernetes. Analytics provided atop that graph allows users to understand risk, eliminate risk and monitor it continuously. Swimlane workflows enable escalations, certifications and risk-exception handling and provide role-based access control for workloads, teams and cloud platforms to ensure adherence to policy. 

Identity Access Map in AWS for Sonrai Dig

New Automation Capabilities 
The Governance Automation Engine for Sonrai Dig automatically dispatches prevention and remediation bots and provides safeguards in the form of code promotion blocks. Helping to ensure end-to-end security in public cloud platforms, Sonrai Dig also fosters excellence in the application lifecycle and in DevOps by preventing users from promoting code to the next stage of the development cycle if public cloud security requirements are unmet. 

Extensive Integration Ecosystem
Sonrai Dig and its growing integration ecosystem have worked closely to ensure cross-platform compatibility through API integrations including:

  • Public Cloud: AWS, Azure, Google Cloud (GCP), Kubernetes
  • IAM: AWS IAM, Azure AD, GCP IAM 
  • Audit: AWS CloudTrail, Azure activity logs, GCP Stackdriver 
  • Data Stores: DynamoDB, RDS, Cosmos DB, Data Lake, SQL, Big Table 
  • Key Stores: KMS, HashiCorp Vault 
  • Infrastructure: WAF, Cloudfront, ELB Compute: ECS, Lambda, Azure Serverless

“Enterprise companies’ explosive expansion of cloud-native development creates a dizzying number of ways people and non-people identities access corporate data, creating unacceptable risk,” said Brendan Hannigan, CEO, Sonrai Security. “Sonrai provides unique technology to find and eliminate all of these risks, in a way that aligns with how applications are developed in today’s world. Our swimlanes, workflow and remediation capabilities are integrated seamlessly to automatically de-risk complex environments and represent an entirely new and effective approach to security.”

About Sonrai Security
Sonrai Security delivers an enterprise identity and data governance platform for AWS, Azure, Google Cloud and Kubernetes. The Sonrai Dig platform is built on a sophisticated graph that identifies and monitors every possible relationship between identities and data that exists inside an organization’s public cloud. Dig’s Governance Automation Engine automates workflow, remediation, and prevention capabilities across cloud and security teams to ensure end-to-end security. The company has offices in New York and New Brunswick, Canada and is backed by Polaris Partners and TenEleven Ventures.

You Might Also Like

Prevent Problems or Fix Them Fast, remediation

Sonrai Security Introduces Automation Engine for Identity and Data Governance in the Cloud

Industry-first identity and data graph and “swimlane” workflows enable comprehensive security across AWS, Azure, GCP and other public clouds

Read More
Shifting Left pillars of cloud security

Pillars of Cloud Security: How “Shift-Left” Enhances a Secure SDLC

Learn the benefits of adopting a shift-left approach to the software development lifecycle (SDLC) and strategies that can bring the practice to life.

Read More
Achieving and Maintaining Least Privilege

Pillars of Cloud Security: Achieving and Maintaining Least Privilege

Least privilege, the state in which identities have access to only what they need and no more, is the ideal […]

Read More
© 2020 Sonraí Security. All rights reserved | Privacy Policy

Sonrai Security cloud security platform, products and services are covered by U.S. Patent No. 10,728,307, together with other domestic and international patents pending. All rights are reserved.

magnifier