Threat Stack Blog and Cloud Security News

Continuous security monitoring for your cloud.

Using Threat Stack to Demonstrate PCI Compliance

by David M. Weinstein , posted in Cloud Security, File Integrity Monitoring, Vulnerability Monitoring, AWS Configuration Auditing, Rulesets, PCI Compliance

Threat Stack PCI Compliance Blog Banner.jpg

PCI Security Standards are technical and operational requirements set by the PCI Security Standards Council to protect cardholder data. Threat Stack customers frequently ask us how  Threat Stack can help them comply with these two sets of requirements:

  • Requirement 10: Track and monitor all access to network resources and cardholder data (in other words, determine the who, what, where, and when)
  • Requirement 11: Regularly test security systems and processes (in order to continuously monitor and test security controls)

The good news is that the following Threat Stack features can provide significant benefits to customers who need to satisfy Requirements 10 and 11:

  • Configuration Auditing
  • Vulnerability Scanning
  • Rules monitoring file integrity, logins, network access, and threat intelligence activity

In the remainder of this post, we’ll demonstrate how these can help you meet your compliance and security goals.

Read More [fa icon=long-arrow-right"]

Jan 30, 2017 2:42:50 PM

[fa icon="comment"] 0 Comments

New Threat Stack Feature: S3 File Integrity Monitoring

by Venkat Pothamsetty , posted in File Integrity Monitoring, S3, FIM, CloudTrail Events

FIM Product Feature Blog Banner.jpg

Threat Stack customers receive a great deal of value from our Linux File Integrity Monitoring (FIM), and we have now extended that capability to S3.

Many of our AWS customers are storing their critical files on S3, and for various security and compliance reasons, those files need to be monitored to see if any are being accessed, altered, or deleted.

To help ensure the integrity of the files in S3 buckets, Threat Stack now supports alerting on access and changes to files in specific buckets. AWS now has capabilities for putting object level access into CloudTrail events, and we have added rules to our base rule set to support that feature.

Read More [fa icon=long-arrow-right"]

Jan 17, 2017 12:53:08 PM

[fa icon="comment"] 0 Comments

MineralTree Achieves PCI Compliance With Threat Stack

by Kevin Eberman , posted in Compliance, File Integrity Monitoring, PCI DSS, HIDS, Compliance Audit, Vulnerability Monitoring

Customer Post MineralTree Blog Banner.jpg

Compliance processes have a reputation for being expensive, time-consuming, and fraught with difficulties — and sometimes certifications are looked upon with skepticism. However, most of the PCI requirements are common sense, best practices that any organization that is concerned with security should adopt. At MineralTree, we use Threat Stack to mitigate security threats. Additionally Threat Stack helps us adhere to PCI requirements and document our compliance.

Let me explain  . . .

Read More [fa icon=long-arrow-right"]

Jan 9, 2017 10:10:30 AM

[fa icon="comment"] 0 Comments

File Integrity Monitoring and Its Role in Meeting Compliance

by Anthony Alves , posted in HIPAA, Cloud Security, File Integrity Monitoring, Regulatory Compliance, PCI DSS, FIM

Compliance_Series_Part_9_Blog_Banner-1.jpg

When’s the last time someone made an unauthorized change to your system files?

To answer this and other important security questions, as well as to meet many compliance requirements, you first need to have file integrity monitoring. In case you aren’t familiar with the term, file integrity monitoring (sometimes abbreviated to FIM) is the method for knowing exactly when and how your files are being changed at any moment in time. This includes critical system files, configuration files, and content files.

Read More [fa icon=long-arrow-right"]

Sep 27, 2016 11:14:32 AM

[fa icon="comment"] 0 Comments

Who is That EC2 User?

by Venkat Pothamsetty , posted in EC2, File Integrity Monitoring, Identity Management

Identity-Management-in-the-Cloud.png

Identity management is a difficult problem in the cloud, especially when it comes to sharing user accounts — an all too familiar (and problematic) practice today. Sharing accounts is very common on EC2, in particular, because EC2 instances come with a standard set of user accounts that a team can begin using immediately. Although it’s possible to create more user accounts, doing so is a resource-intensive task that is not a top priority for most operations personnel — and as a result, teams often end up sharing the default accounts.

Read More [fa icon=long-arrow-right"]

May 17, 2016 11:53:20 AM

[fa icon="comment"] 0 Comments

Subscribe via email:

Posts by Topic

see all