Threat Stack Blog and Cloud Security News

Continuous security monitoring for your cloud.

New Threat Stack Feature: S3 File Integrity Monitoring

by Venkat Pothamsetty , posted in File Integrity Monitoring, S3, FIM, CloudTrail Events

FIM Product Feature Blog Banner.jpg

Threat Stack customers receive a great deal of value from our Linux File Integrity Monitoring (FIM), and we have now extended that capability to S3.

Many of our AWS customers are storing their critical files on S3, and for various security and compliance reasons, those files need to be monitored to see if any are being accessed, altered, or deleted.

To help ensure the integrity of the files in S3 buckets, Threat Stack now supports alerting on access and changes to files in specific buckets. AWS now has capabilities for putting object level access into CloudTrail events, and we have added rules to our base rule set to support that feature.

Read More [fa icon=long-arrow-right"]

Jan 17, 2017 12:53:08 PM

[fa icon="comment"] 0 Comments

File Integrity Monitoring and Its Role in Meeting Compliance

by Anthony Alves , posted in HIPAA, Cloud Security, File Integrity Monitoring, Regulatory Compliance, PCI DSS, FIM

Compliance_Series_Part_9_Blog_Banner-1.jpg

When’s the last time someone made an unauthorized change to your system files?

To answer this and other important security questions, as well as to meet many compliance requirements, you first need to have file integrity monitoring. In case you aren’t familiar with the term, file integrity monitoring (sometimes abbreviated to FIM) is the method for knowing exactly when and how your files are being changed at any moment in time. This includes critical system files, configuration files, and content files.

Read More [fa icon=long-arrow-right"]

Sep 27, 2016 11:14:32 AM

[fa icon="comment"] 0 Comments

Subscribe via email:

Posts by Topic

see all