Orca Security has announced new product features that further simplify security and compliance operations in the cloud.
For the first time, security teams can manage their cloud security configuration, protect workloads, manage infrastructure entitlements, achieve broad regulatory compliance, and assess their cloud security from a single multi-platform -agentless cloud. Orca Security’s contextual engine unifies intelligence gathered deep within the workload with details of cloud configuration and infrastructure entitlements to immediately surface risks and their root cause.
Other Orca Security updates include support for over forty compliance frameworks and Orca Security Score – the first-ever benchmark to help organizations benchmark their multi-cloud security posture against industry peers and through their own business units.
Identity is a key part of cloud security,” said Avi Shua, co-founder and CEO of Orca Security. “Unlike other cloud security solutions that take a siled approach to identity risk, Orca Security gives practitioners a complete view of their security posture as well as contextualized risks, such as vulnerabilities, misconfigurations, malware infections and sensitive data Orca Security also goes beyond cloud-native identities, to also consider unmanaged identities that are provisioned as SSH keys and passwords residing on workloads This gives our customers the comprehensive coverage they need to innovate securely in the cloud.
According to Gartner, “By 2024, organizations running cloud infrastructure services will experience at least 2,300 least privilege policy violations, per account, each year.” This report also states that “the vast majority of rights granted in IaaS are unnecessary. More than 95% of IaaS accounts use, on average, less than 3% of the rights granted to them, which greatly increases the attack surface for account compromises.
Orca Security CIEM capabilities go far beyond identity hygiene
Cloud Infrastructure Entitlement Management (CIEM) is a core feature of modern cloud security platforms. Orca Security monitors all identities, roles, groups, permissions, and policies deployed in a public cloud environment and alerts teams to violations of identity management best practices, such as the principle of least-privilege access.
Unlike traditional CIEM solutions, which are limited to managed identities in the cloud, Orca Security maps unmanaged identities, such as private SSH keys, cloud provider keys stored in files, environment variables containing secrets and incorrectly stored passwords that could be used for lateral moves.
By combining CIEM, CSPM, and CWPP capabilities into a single CNAPP platform and data model, Orca Security can flag attack chains containing risky combinations. For example, an infected workload that can assume a highly privileged instance role allowing access to a database with PII is prioritized for immediate remediation.
Multicloud Security Score
Orca Security Score helps security and compliance teams demonstrate the status of their security controls and their progress to auditors, senior management, board of directors, investors and cyber insurance companies. Organizations can now benchmark their cloud security against their industry peers or across business units, as well as measure their progress over time. The Orca Security score is based on factors such as suspicious activity, lateral movement risk, data at risk, vulnerable assets, and time to resolve critical security issues.
Built-in compliance for over forty frameworks and benchmarks
In addition to HIPAA, GDPR, PCI-DSS, SOC 2, NIST, CCPA, FedRamp, ISO, CIS Docker and others, Orca Security now supports CIS Kubernetes Benchmarks and the New Zealand Information Security Manual Framework (NZISM).