Identity and Data Governance for AWS, Azure, Google Cloud, and Kubernetes
Sonrai Dig is built on a sophisticated graph that continuously identifies and monitors every possible relationship between identities and data that exists inside your public cloud.
Identity Risk Monitoring and Access Graphing
Uncover all identity and data relationships between people and non-people identities (admins, roles, compute instances, serverless functions, and containers) across multi-cloud accounts and 3rd-party data stores. Sonrai Dig, our identity and data governance platform, graphs all access paths to enforce Least Privilege, and workflow enables certification of identities. Risks eliminated include:
Separation of duties
Who/what has access rights?
Discover, Classify, Lock Down, and Monitor “Crown-Jewel” Data
Inside Sonrai Dig, our critical resource monitor relentlessly monitors your critical data sitting inside object stores (e.g. AWS S3, Azure Blob) and database services (e.g. CosmosDB, DynamoDB, RDS). Suspicious access activity or undesirable changes in access rights are flagged.
What is normal access behavior?
What or who can access this resource and from where?
What is accessing this resource?
What has changed?
What is the blast-radius?
Integration and Automation Between Security, Cloud, Audit, IAM, and DevOps Teams
With first-generation security tools, too many alerts repeatedly go to the wrong teams. With Sonrai Dig this does not happen. Dig organizes your cloud into swimlanes broken down by team and project. Role-based access gives different views depending on role and owners with context-based alerts going to the correct teams. The platform is API driven so it tightly integrates into your CI/CD pipeline. Code promotions with policy violations are blocked so that they don’t get into production.
Prevention and Remediation Bots
Remediation bots fix problems that are found. But, how about preventing those problems from happening in the first place? Sonrai Dig does both! Our identity and data governance platform puts prevention rules in place across your cloud and makes sure they stay there. As people try to move workloads to production, checks are in place, and promotion only happens if your risk policies are followed.
Cloud and Data Integrations
We work hard with our cloud partners to leverage the capabilities that they have. However, Sonrai Dig delivers an identity and data governance platform that is the basis of a cloud security and risk operating model that spans clouds, data stores, key stores, and container platforms. Sonrai Dig does all of this in a beautiful cross-platform way. Example integrations:
Public Cloud Platforms: AWS, Azure, Google Cloud (GCP)
Our platform is multi-cloud. Identity and data activity for 100s of AWS accounts, Azure subscriptions, and GCP projects are normalized and modeled. 3rd party data stores and key stores (e.g. Vault) are also normalized. Teams do not need to understand the intricacies of differing cloud security models and daily service updates.
Control Frameworks and Compliance Dashboards
Privacy and compliance controls are monitored across multiple cloud providers and 3rd party data stores. Resolutions are coordinated with relevant DevOps teams. Capabilities include:
GDPR, HIPAA, PCI dashboards and more
Data sovereignty monitoring
Data asset inventory
Customizable controls and compliance dashboards
Monitoring PII data movement
Webinar: Pillars of Cloud Security: Achieving and Maintaining Least Privilege
Least privilege, the state in which identities have access to only what they need and no more, is ideal for a cloud security environment. Taking a data-driven approach is fundamental to monitor IAM permissions as well as data access to achieve and maintain least privilege. The key is being able to determine the effective permissions completely, including all direct and indirect access paths from both people and non-people identities.