PF Aws Container Security Monitoring Guide
PF Aws Container Security Monitoring Guide
Why security and visibility are top of mind for AWS customers 6
Developers 8
Cloud/DevOps 8
Security and compliance 8
Host security 12
Authentication and authorization 13
Image scanning 14
CI/CD pipeline security 16
Image assurance 18
Registry security 18
Compliance 19
Network security 21
File Integrity Monitoring (FIM) 23
Runtime security 25
Conclusion 48
Additional resources 49
Delivering on these demands is happening on the back of public clouds, which provide
the dynamic environment that supports these needs. It’s also facilitated with container
application development and DevOps approaches that allow development teams to rapidly
spin up software, make adjustments, and continuously deliver solutions that meet customer
and market needs.
These changes are not just about business practices in a digital format. The fundamental
aspects of the cloud and containers are enabling an entirely new way of doing business.
For all of this to happen, companies need complementary security that can keep pace with
the speed and agility of the cloud and containers, but don’t slow down the very processes
that deliver faster results. This duality in goals – accelerating delivery while ensuring
security – demands an approach that both protects data and workloads, and facilitates agile
application development. In other words, make it safe but don’t slow it down.
New paradigms like containers, microservices, and hybrid cloud workloads disrupt the way
enterprises implement security. Containers provide great portability and isolation, making
them ideal for moving applications from development to production. As enterprises move
from initial sandbox to production deployments, they face challenges establishing cloud
security and compliance processes, as well as operating containers securely and reliably.
Deploying workloads in the cloud involves complex interactions among microservices.
Serverless instances function as fluid architectures, changing every few minutes or seconds
to create a constantly changing security environment. Use of these new solutions enable
business to move fast, but present a new set of potential threats.
Cloud teams are increasingly adopting Amazon Web Services (AWS) cloud and container
services, including Amazon ECS, Amazon EKS, and AWS Fargate, to deliver applications
faster at scale. Along with the roll-out of architectures with containers and orchestration,
what’s needed to stay on top of the security, performance, and health of applications and
infrastructure has shifted.
The Sysdig Secure DevOps Platform provides security to confidently run containers,
Kubernetes, and cloud. With Sysdig, you can secure the build, detect and respond to threats,
and continuously validate cloud posture and compliance. In addition, our solutions will
help you maximize performance and availability by monitoring and troubleshooting cloud
infrastructure and services. At Sysdig, we provide a SaaS platform, built on an open-source
stack that includes Falco and sysdig OSS, the open standards for runtime threat detection
and response.
• Speed up deployment by validating security policies and configurations during the build
process.
• Prevent issues by monitoring performance and health across infrastructure, services, and
applications.
This guide offers a framework for establishing comprehensive cloud and container security
for AWS environments with specific recommendations for how Sysdig can complement and
enhance native AWS tools.
Continuous cloud change requires continuous monitoring. That monitoring must function
across all cloud and orchestration activities to provide visibility into in-use cloud assets
and audit settings. It also has to perform continuous scanning and analysis of cloud and
container activity to manage health and security risk.
With an automated approach, cloud activity can be analyzed and interpreted, and DevOps
and security teams can be alerted about abnormal behavior within their AWS environment.
This helps you address vulnerabilities and issues before they are exploited, slow down your
development process, and impact your business applications.
Developers
AWS helps developers take advantage of cloud services, containerized applications, and
orchestration without having to know the underlying infrastructure details. AWS continuous
integration and continuous delivery (CI/CD) pipelines streamline the process of building,
distributing, and deploying containerized applications. Using AWS frameworks like AWS
CodeBuild and AWS CodePipeline for combining source code and base images, developers
can push changes to a repository such as GitHub. AWS container services will create a
container image from the source code and push it to a registry like Amazon Elastic Container
Registry (ECR). Ensuring container images are free of known vulnerabilities and follow
security best practices is a major challenge that often compromises application integrity and
can slow down release schedules.
Cloud/DevOps
Cloud and DevOps teams are responsible for maintaining high availability, quality of service,
health, and performance of applications and infrastructure. Users leverage the built-in
AWS web console to manage the infrastructure and platform capabilities, and also rely on
playbooks to automate application deployments. DevOps teams are required to ensure that
they build security into the platform with features like Falco (the open-source cloud native
runtime security project), Pod Security Policies, network policies, and more.
AWS container services provide a baseline coverage for security and monitoring across the
entire container platform -- workloads, accounts, users, and all the interactions happening
within the AWS environment. As you scale out the number of applications, clusters,
locations, and cloud providers, Sysdig extends AWS container services, providing additional
security and monitoring capabilities to:
At Sysdig, we provide the only comprehensive, unified platform that features cloud and
container security and monitoring. Incorporating the capabilities of a Cloud Workload
Protection Platform (CWPP) with Cloud Security Posture Management (CSPM), as well as
These tools operate as a unified security and visibility layer over AWS environments to
eliminate silos of information that exist across operations, development, DevOps, and
security teams. At Sysdig, we enable security and DevOps teams to accurately identify
and triage incidents, quickly determine cause, and perform forensics even for container
workloads that are no longer running.
Using the Sysdig platform, security and DevOps teams can report on security issues across the
entire AWS environment, including suspicious user behavior, threats to data, and vulnerabilities
affecting running images in specific namespaces and clusters. For example, if a new vulnerability
is reported, Sysdig can help your DevOps teams quickly identify the affected images in a
particular public cloud (AWS) region, namespace, cluster, etc., as well as the team that owns the
fix. With this approach, you can resolve issues quickly by analyzing vulnerabilities and granular
system data automatically correlated to both cloud and Kubernetes contexts.
We help you deliver reliable and secure cloud applications and provides centralized visibility
and security for operating AWS container services at scale. Sysdig is a SaaS-first platform,
hosted in AWS. With a single agent deployed per EC2 instance, the Sysdig platform can
scale to 10,000+ nodes to secure and monitor containers and applications running on AWS
container services clusters.
You can get started quickly with guided onboarding, out-of-the-box dashboards, and
curated workflows. Because Sysdig plugs into your cloud environment and existing DevOps
workflow using automation and out-of-the-box integrations, visibility and security controls
won’t slow you down.
Registries Events
Infra
• ServiceVision™ integrates with ECS and EKS to automatically enrich all of your metrics
and events with orchestration metadata.
• Secure hosting infrastructure with Amazon EC2, Amazon Linux 2, and Bottlerocket.
Host security
Cloud security is the highest priority for AWS. Customers benefit from a datacenter
and network architecture built to meet the requirements of the most security-sensitive
organizations. As a managed service, Amazon EC2 is protected by AWS global network
security procedures.
AWS recommends using a layered approach that includes host-based controls for EC2
instances, which can restrict access to the environment. Typically, an enterprise will employ
a host-based intrusion detection system (HIDS) that monitors and analyzes network traffic,
host-level access, and corresponding log files. Amazon CloudWatch is a standard solution to
collect and distribute alerts from a HIDS.
AWS provides...
To securely operate containers on AWS, Amazon offers secure, stable, and high-
performance operating systems to run cloud-native applications. This includes Amazon
Linux 2 and Bottlerocket.
• Amazon Linux 2 is the next generation of Amazon Linux that is secure by default. It
reduces the number of non-critical packages, limiting exposure to potential security
vulnerabilities. With Amazon Linux 2, security updates rated “critical” or “important” are
automatically applied on the initial boot.
Sysdig adds...
Sysdig provides host scanning to help you detect package vulnerabilities on virtual and
physical server or cloud-native host instances. Detailed reports will help your operational
teams understand what needs to be patched to avoid incidents like breaches or zero-day
vulnerabilities.
Sysdig Secure provides detection for host OS and non-OS packages and reduces time-to-
fix by assessing impact and ownership using rich cloud and Kubernetes context. A single
vulnerability management solution for hosts and containers will help you reduce risk,
keep pace with regulatory requirements and compliance, and save time by consolidating
workflows.
Users access various services through requests based on their AWS credentials. However,
for some resources like S3 storage, granular-level permission can be granted to provide
unique access to only that source. The request context is evaluated based on policies that
AWS users apply to their environment. Policies are stored as JSON documents and operate
as the de facto source for permissions.
Specific access to AWS services is provided through standard interfaces including the Web
UI, CLI, and APIs. Additionally, services interact with AWS container services so they can be
aware of their orchestration state and execute actions against these platforms. Imagine a CI/
CD pipeline pushing a new deployment into production. How do you control and measure
who can do what?
AWS provides...
AWS IAM enables you to manage access to AWS services and resources securely. Using IAM,
you can create and manage AWS users and groups, and use permissions to allow or deny
access to AWS resources. IAM administrators control who can be authenticated (signed in)
and authorized (have permissions) to use EKS, ECS, and Fargate resources.
With Sysdig Teams, administrators can define groups of users that have access to a specific
service or limited set of services deployed on AWS. For example, an application owner might
only see vulnerability scan results of images in a specific namespace. Limiting the exposure
with access controls and providing a default configuration for each specific team helps
streamline security information for users and teams.
Sysdig supports role-based access controls (RBAC) to define user privileges and provides
federated access control across different teams in an organization. In addition to the admin
role, a variety of access roles are available, including View Only, Standard User, Advanced
User, and Team Manager.
Image scanning
Container applications and infrastructure components are built on top of readily available
packages, many of which are open-source software that might contain old library versions.
It’s important to know where these packages originally came from, who built them, and
whether there are any known vulnerabilities inside them.
AWS provides...
Amazon Elastic Container Registry (ECR) is a fully-managed Docker container registry
that makes it easy for developers to store, manage, and deploy Docker container images.
Amazon ECR is integrated with AWS container services like ECS and EKS, simplifying your
development to production workflow.
As users begin adopting containers on AWS takes, ECR scanning is the first step towards
delivering continuous security and compliance. ECR uses the Common Vulnerabilities and
Exposures (CVE) database from the open source Clair project to provide you with a list of
scan findings. You need to ensure you are scanning your images pulled from ECR for both
vulnerabilities and misconfigurations so you don’t push applications running on AWS that are
exploitable.
Sysdig adds...
Sysdig Secure embeds security and compliance across all stages of the Kubernetes lifecycle.
Leveraging 15+ CVE threat feeds, Sysdig Secure provides a single workflow to detect
vulnerabilities and security or compliance-related misconfigurations. As your teams build
applications, Sysdig prevents vulnerable images from being pushed through your CI/CD
pipeline and identifies new vulnerabilities in production.
When it comes to pre-deployment scanning, Sysdig provides two container image scanning
options.
• A standard approach that requires you to send your images to Sysdig for scanning. Post-
scan, you can view the results within the Sysdig Secure UI.
• Local scanning, also known as inline scanning, scans images directly within your CI/CD
pipeline or ECR registry. This option enables a more secure approach as you don’t need
to share registry credentials or image contents outside of your AWS environment. You
also get scan results quickly by having the scan automated and reports generated directly
within ECR.
• Vulnerabilities in third-party libraries such as Javascript NPM modules, Python PiP, Ruby
GEM, and Java JAR archives.
These artifacts are stored and evaluated against custom scanning policies that can be
specified to a particular registry, repository, or image tag. Sysdig Secure scanning policies
help detect vulnerabilities, misconfiguration, or compliance issues within your images and
generate pass/fail results directly in the UI.
For Fargate users, a feature unique to the Sysdig solution is the ability to trigger scans of
images within ECR for Fargate tasks as they start. Taking advantage of Amazon EventBridge,
Sysdig intercepts the Fargate request, identifies the image, and performs the scan. This
automated local scanning capability helps you ensure the security of your containers
intended to run on the serverless platform.
AWS provides...
AWS allows you to set up a Continuous Integration/Continuous Delivery Pipeline to
automate your software delivery process. Several tools help DevOps teams automate the
software delivery process: CodeCommit for version control, CodeBuild for building and
testing code, and CodeDeploy for automatic code deployment. On top of all of these tools,
CodePipeline allows them to visualize and automate these different stages.
AWS CodePipeline is a fully managed, continuous delivery service that automates release
pipelines for application and infrastructure updates. CodePipeline automates the build, test,
and deploy phases of the release process every time there is a code change, based on the
defined release model.
Sysdig adds...
Image Scanning for CI/CD pipelines that are used with AWS raises the confidence that
DevOps teams have in the security of their deployments, detecting known vulnerabilities
and validating container build configuration early in their pipelines. By detecting those issues
before the images are published into a container registry or deployed in production, fixes can
be applied faster, improving delivery to production time.
Sysdig Secure image scanning integrates directly into your CI/CD pipeline of choice, including
AWS CodeBuild, AWS CodePipeline, Jenkins, Bamboo, GitLab, CircleCI, Tekton, and more.
You can catch vulnerabilities and misconfigurations in third-party libraries, official/unofficial
OS and packages, configuration checks, credential exposures, and metadata. Using Sysdig’s
local inline scanning you can detect issues before the images are even pushed to the registry.
Sysdig’s scanning integration with CI/CD pipelines gives developers the information they
need directly within their CI/CD tool to understand why a scan failed and what needs to be
fixed. For non-critical policy violations, warnings will suggest what needs to be changed to
improve the security of the container image without aborting the pipeline.
Using Sysdig, images built using AWS CodePipeline can be scanned without having the
images leave the infrastructure and the need for a staging registry. Multiple scans can be run
in parallel, improving throughput.
1
4 5
Commit
Builds Scans
2 3 6
Publishers
AWS provides...
Kubernetes admission controllers can be used with EKS to prevent unapproved images from
being deployed in your orchestrated container cluster. Using this Kubernetes capability, EKS
supports the evaluation of requests to the Kubernetes API to deny requests that fail to meet
defined security requirements.
Sysdig adds...
EKS can check against Sysdig Secure to evaluate whether an image is compliant with the
configured security policies. When using the admission controller, this security validation
decision will be propagated back to the API, which will reply to the original requester and
only persist the object in the etcd database if the image passes the checks.
Registry security
In addition to securing your container images, the security of your registry itself is another
key step to reduce risk for your organization. Using RBAC to manage who can pull and push
container images, as well as using a private registry, are some of the steps you can take to
protect your organization.
AWS provides...
Amazon ECR is a managed AWS Docker registry service that is secure, scalable, and reliable.
Amazon ECR supports private Docker repositories with resource-based permissions using
AWS IAM so that specific users, or Amazon EC2 instances, can access repositories and
images. Developers can use the Docker CLI to push, pull, and manage images.
Compliance
Enterprise computing environments running microservices on AWS consist of hundreds or
thousands of interconnected applications and services, as well as a large and diverse set of
users. To maintain control over the security of this vast environment, a standard way to scan
systems for compliance with security policies is needed.
AWS provides...
AWS Config is a service that enables you to assess, audit, and evaluate the configurations
of your AWS resources. It continuously monitors and records your AWS resource services
configurations and allows you to automate the evaluation of recorded configurations against
desired ones. This enables you to simplify compliance auditing, security analysis, change
management, and operational troubleshooting.
Sysdig adds...
Sysdig extends compliance across the container lifecycle for standards like NIST and PCI.
Being able to validate that a deployment is compliant with desired configurations is one of
the first compliance steps. But compliance requirements don’t end there. Compliance for
containers introduces unique requirements and should be implemented at various points:
• Checking against cloud, container, and infrastructure security best practices using Center
for Internet Security (CIS) benchmarks for AWS, Docker, and Kubernetes.
• During build, mapping container image scanning policies to standards like NIST 800-190,
PCI, and HIPAA.
• During runtime, using policies to continuously detect attack frameworks like MITRE
ATT&CK or check compliance after deployment.
• Auditing any changes in your container environments, which is part of SOC2, PCI, ISO,
and HIPAA requirements.
Sysdig helps you track progress using compliance dashboards. Starting with the
infrastructure layer, Sysdig performs specific host, platform, and container compliance
checks, like AWS Foundation benchmarks, Kubernetes benchmarks, and Docker CIS
benchmarks. Sysdig also provides remediation guidance for correcting policy violations. This
makes it faster to resolve configuration issues when they come up.
• Ensuring containers use trusted base images and only necessary packages.
When a new high/critical CVE is published, you can assess your exposure immediately.
Affected services and accountable teams can be quickly identified. Developers or application
owners are identified using Kubernetes or cloud metadata, like service, deployment, or
application, and alerted to view their images and vulnerabilities.
The ability to segment, isolate, and control networks is a critical point of control for Zero
Trust and is increasingly essential to achieving more effective security in container and
Kubernetes environments.
Without the right tools, DevOps teams will struggle to see how their containerized apps
are communicating and may miss malicious attempts that take advantage of open network
policies. Applying a Zero Trust network security model in Kubernetes is challenging without
knowing how applications are being used.
AWS provides...
Containerized applications on AWS typically require access to other services running within
the cluster, as well as external AWS cloud services. AWS addresses network security for
Kubernetes by assigning specific EC2 security groups directly to pods running in EKS clusters.
Security groups for pods enable network security compliance by running applications with
varying network security requirements on shared compute resources.
Network security rules can be defined within EC2 security groups and applied to pod-to-pod
and pod-to-external AWS service traffic for applications with Kubernetes native APIs. With
this approach, you can reuse operational knowledge and tooling with AWS security group
policies to implement security at the networking and authentication layers.
Sysdig Secure automatically discovers all network traffic for EKS pods, services, and
applications through visibility into system calls. The data is auto-tagged with Kubernetes
context and labels, and used to simplify your experience when implementing Kubernetes
network policies.
Dynamic topology maps let you visualize all network communication between apps
and services, and drill down into the traffic flow over a particular time frame. Using this
information in a simple UI, you can apply segmentation and refine network policies to allow
or block connections. Sysdig will automatically generate a YAML file that you can use to apply
the policy to your Kubernetes cluster.
Using Sysdig to enable Zero Trust network security based on an open, standards-based
approach vetted by the community delivers better performance, reliability, and security
because Kubernetes provides enforcement. This eliminates the need for man-in-the- middle
enforcement mechanisms. By providing an easy-to-use interface and automating guardrails
for teams who may lack Kubernetes expertise, Sysdig helps AWS users save time and reduce
network security risk.
• Check if a file exists or is missing, and trigger alerts based on the condition.
• Validate a specific file against its SHA256 hash. Any modification to binaries in your
containers is flagged as suspicious and potentially dangerous.
• Validate file permissions. For example, you can be alerted if a file has an executable bit
where it’s unexpected.
You can also implement FIM policies at runtime that alert on any suspicious changes to a
filesystem. These are common file integrity monitoring checks that you should include as
rules to enforce a strong security posture:
Beyond generating robust reports, the Sysdig platform translates security benchmarks into
a set of security metrics and dashboards. Internal and external compliance and audit teams
can analyze their security posture, quickly visualize patterns and trends, and gain valuable
insights into their compliance posture to:
• Understand the risk and compliance posture across applications and environments.
Runtime security
Security monitoring
Gaining visibility across both monitoring and security for AWS cloud and container services
is necessary for a successful transformation journey. For example, the security team needs
to know if a crypto-mining or denial of service (DoS) attack can be further explained by an
abnormal deviation in a particular performance metric.
Threat detection
Sysdig leverages the CNCF Falco project open-source detection engine to monitor
anomalous activity on hosts and containers at runtime. It also ingests and monitors activity
from AWS CloudTrail logs as well as your orchestration layer when using Kubernetes and
the EKS-managed service.
Scanning your containers once during the CI/CD process or from your AWS Elastic Container
Registry is not enough. While known software vulnerabilities are detected, several security
threats, by their very nature, only manifest during runtime, including:
Default policies are available out-of-the-box along with more than 200 rules that simplify
the job of customizing security to meet your requirements. Using Sysdig Secure policies, you
can easily implement runtime security to detect threats to your AWS cloud and container
services, including Fargate, ECS, and EKS. This includes:
• Container runtime security policies for regulatory container compliance standards: NIST
SP 800-190, PCI, CIS, or MITRE ATT&CK framework.
• CloudTrail detection rules to identify suspicious activity across your AWS cloud services.
To ease the burden of creating and maintaining runtime security in large-scale environments,
Sysdig Secure features runtime image profiling. Image profiling automatically models,
analyzes, and learns container runtime behavior to create a comprehensive container
runtime profile and automatically builds policies for you. This includes analyzing kube-
apiserver activity and syscalls while enriching them with various metadata, including ECS,
EKS, and cloud labels. This approach enhances anomaly detection through machine learning
and helps you block threats before they propagate.
Sysdig prevents threats using Kubernetes native controls, such as Pod Security Policies
(PSPs). The Kubernetes Policy Advisor automates the generation of PSPs and validates them
pre-deployment so they don’t break applications when applied. This allows users to adopt
PSPs in production environments quickly and easily. PSPs also provide a Kubernetes native
control mechanism to prevent threats without impacting performance, unlike agents that
have to intercept every action on the host.
Sysdig Secure leverages Kubernetes-native controls like PSP for enforcement. You can read
more about it on the blog Pod Security Policies in production with Sysdig’s Kubernetes Policy
Advisor and learn about Sysdig runtime security capabilities here.
Using different cloud and container security tools complicates security operations as it
requires manual correlation of different data sources to fully understand a breach and
uncover the systems impacted. Sysdig pairs Cloud Security Posture Management (CSPM)
and cloud threat detection with cloud workload protection, including container and
Kubernetes security features in a single platform.
By unifying the incident timeline and adding risk-based insights, Sysdig reduces the time
to detect threats in your AWS cloud services and containers from weeks to hours. Cloud
development teams can see exactly where the attacker started and each step they took as
they moved through the environment.
Applications in AWS are usually composed of multiple services that perform specific
functions and are accessible through an API. For each service, there is a connection to
other resources within the cloud environment — these include object stores, microservices,
databases, S3 buckets, and other repositories and resources.
Most organizations apply a manual approach to identify these resources, their relationships,
and their configurations. Manual management in an environment that is continuously
expanding and contracting isn’t scalable, so automated services are necessary to create and
track an inventory of these assets and their behaviors.
Using Application Discovery Service APIs, you can export the system performance and
utilization data for your discovered servers. Input this data into your cost model to compute
Sysdig adds…
Cloud security teams can use Sysdig to manage their security posture by automatically
discovering the systems, applications, services, and scripts running across an AWS cloud
environment. This lets you map cloud assets, including accounts, VPCs, regions, S3 buckets,
RDS, etc. to gain a better understanding of where your sensitive data( e.g., customer data,
data governed by compliance regulations) is stored and processed.
This capability – based on Cloud Custodian, an open source tool for securing cloud
infrastructure – offers a real-time dashboard of the resources and assets operating in your
AWS account as well as all assets that roll up into each resource and project. With a baseline
for your current operating state, you can better prioritize the services with the most critical
threats and accelerate remediation.
With Sysdig, you can drill into each AWS resource and project to see the corresponding
configurations. Sysdig identifies and classifies the assets in each of your AWS accounts, along
with data from other systems, to create one source of truth for all of the services in your cloud.
Sysdig users are able to customize all the data provided in inventory management, reducing
the need to manually correlate event information. Because Sysdig Secure also delivers
related context about Kubernetes activity, users can get a better understanding of what is
happening with workloads in parallel with AWS managed cloud services security events.
To prevent cloud permission risk, cloud teams can leverage a Cloud Infrastructure
Entitlements Management (CIEM) solution. CIEM tools specialize in looking for accounts
and roles with excessive or unused permissions, as well as unused accounts. Due to the
fine granularity of permissions available in the Cloud environments, CIEM tools are key to
achieving proper access configurations. Carefully giving exactly what a user or system needs
to perform its actions is fundamental to cloud security. Using this “least privilege” concept is
a crucial best practice to avoid risks of data breaches, contain privilege escalation, and block
lateral movement.
AWS provides…
AWS Identity and Access Management (IAM) Access Analyzer provides monitoring and
analysis of new or updated resource policies to help you understand potential security
implications. You can preview Access Analyzer findings before deploying resource
permissions so you can validate that your policy changes grant only intended access. This
helps you preview how your policy will affect public and cross-account access before
deploying resource permissions.
Sysdig adds…
Sysdig includes Cloud Infrastructure Entitlements Management that provides you with a
comprehensive view into access permissions across your AWS accounts, users, and services
including serverless functions. Because Sysdig Secure analyzes audit logs of executed cloud
commands and correlates this activity with policies, roles, and users in your accounts, it can
use this same information to create a profile of permission usage. This helps you simplify the
auditing of access configurations and meet compliance requirements.
Sysdig CIEM visualizations help you understand real permission usage and determine where
there is overly permissive or outdated access that puts you at risk of exposure to credential
misuse. An out-of-the-box dashboard informs you of:
• How many users are inactive and which you should consider deleting.
• The policies, users, and roles with the worst case of unused permissions.
You can use these metrics to track your progress towards a stronger IAM security posture.
With cloud workload and application development changing rapidly, app features evolve
continuously. This results in corresponding configuration changes that cannot be manually
tracked. Between AWS and Sysdig, cloud users benefit from continuous cloud configuration
monitoring and audit reports across their AWS accounts, which detect compliance violations
across the networking, storage, user access, and logging aspects of an AWS infrastructure.
AWS provides…
AWS Config performs continuous assessment, auditing, and reporting on configurations in
AWS resources. It monitors and logs an environment’s AWS resource configurations, and
enables the application of predefined configurations when changes are needed. It allows
admins to review configuration changes and how they impact the relationships between and
among other AWS resources, and provides analysis of historical evolution of changes. Users
can see what configurations their workloads have been operating within over a period of
time to determine when (and where within the environment) a change in an AWS resource
impacted a configuration.
When enabled, AWS Config discovers the supported AWS resources that exist in a given
account and generates an accepted configuration report for each resource. It creates
configuration items for every supported resource in a user’s environment.
Sysdig adds…
As AWS accounts involve more workloads and integrations across a growing number of
applications, the volume of events and operational trails can become overwhelming. Analysis
is impossible without a scalable, automated approach. Sysdig Secure helps you identify risky
configuration settings and gain visibility into the current security posture of your cloud and
container environment. This simplifies detection of misconfigurations, such as public storage
buckets, exposed security groups, leaked secrets/credentials, etc., to quickly determine if you
have configuration drift.
From the perspective of security and DevOps teams, by providing configuration insights in
an easy-to-read, contextual format which aids auditing, Sysdig provides tangible business
benefits by simplifying compliance and adherence to policies. This is increasingly an essential
task for security teams because it allows them to reach their goals in an automated fashion.
AWS provides...
The event history available from CloudTrail simplifies security analysis, resource change
tracking, and troubleshooting. You can use the information CloudTrail provides to
detect unusual activity in your AWS accounts and to simplify operational analysis and
troubleshooting. CloudTrail allows you to track and respond to account activity threatening
the security of your AWS resources.
Sysdig adds...
As your infrastructure grows, the amount of events and operational logs available from
CloudTrail can increase to a size that prohibits manual analysis and response. Delays in
reacting to a threat can potentially have major consequences.
Sysdig solves the challenge of automating the evaluation of CloudTrail events in real time by
using a flexible set of security rules based on open-source Falco threat detection – the same
engine that detects threats across your containers and Kubernetes deployments.
Using Sysdig’s integration with CloudTrail, you can use pre-configured policies, or craft
your own detections to alert on unexpected activity. You can save time by leveraging a
comprehensive set of over 100 community-driven, out-of-the-box Falco rules. In addition,
DevOps and security teams get findings quickly by seeing events directly in AWS Security
Hub, without ever leaving their AWS environment.
Once configured, Sysdig Secure will continuously detect and report suspicious cloud activity
and events for services such as IAM, RDS, EC2, RedShift, and VPC across all of your cloud
accounts. Here are just a few use case examples:
• Detect process execution patterns for unexpected behavior or remote code executions.
• Identify changes in configuration of cloud resources (e.g., S3), infrastructure ports for
virtual servers, containers, and container orchestration platforms.
AWS provides...
AWS offers Amazon CloudWatch, a service that monitors and observes the operational
health of AWS resources and applications through logs, metrics, and events.
Prometheus metrics can also be collected in CloudWatch to monitor, troubleshoot, and alert
on application performance degradation and failures faster.
Sysdig Adds....
Sysdig Monitor allows you to maximize the performance and availability of your cloud
infrastructure, services, and applications. Built on open source, it provides immediate, deep
visibility into rapidly changing container environments. You can resolve issues faster by
using granular data derived from actual system calls enriched with cloud and Kubernetes
context along with Prometheus metrics. Sysdig Monitor helps you remove silos by unifying
data across teams for hybrid and multi-cloud monitoring.
With Sysdig Monitor, we offer a scalable managed Prometheus service that frees cloud
teams from the burden of setting up and managing their own monitoring system without
sacrificing the benefits of the Prometheus open standard. Sysdig Monitor provides
automatic discovery and assisted deployment of Prometheus monitoring integrations along
with preconfigured dashboards and alerts.
Support for the Prometheus Query Language (PromQL) and a PromQL Explorer Sysdig
simplifies your interaction with metrics to speed mean time to discover (MTTD) using
queries. In addition, a PromQL Library helps you discover popular queries from the
monitoring community to learn new ways to get to the information that really matters.
• Monitor health and performance with deep visibility into infrastructure, services, and
applications.
• Visualize the operational status of your clusters with Kubernetes orchestration context.
• Immediately identify owners for issue resolution using container and cloud context.
• Accelerate time to insight, with a single source of truth for application availability and
security, so teams can resolve issues faster.
• Improve application performance and rapidly solve issues with deep container visibility
and granular metrics enriched with Kubernetes and cloud context.
• Observe metrics from cloud services, databases, and other key components in your AWS
environment using out-of-the-box dashboards.
• Monitor the impact of a given security incident on the availability of a service to your
users.
• Reduce risk by utilizing enterprise-grade access controls for your monitoring system
including teams, SSO, and RBAC.
• Leverage your existing developer investment with full Prometheus and PromQL
compatibility at cloud-scale.
Having validated support with documentation saves weeks of effort by reducing developer
time spent researching and maintaining Prometheus integrations. Example AWS integrations
include support for AWS Fargate, AWS Lambda, AWS Application Load Balancer (AWS ALB),
AWS Elastic Load Balancer (AWS ELB), and Amazon Simple Storage Service (Amazon S3).
AWS App Mesh uses the open-source Envoy proxy, making it compatible with a wide range of
AWS Partner Network (APN) and open-source tools for monitoring microservices.
Sysdig adds...
Sysdig supports AWS App Mesh, providing additional visibility into how microservices
running on AWS container services are performing, with further insight into the security
profile and overall health of their service mesh. With Sysdig, AWS App Mesh users can
monitor the performance of their service mesh as well as view performance and security
metrics across their infrastructure, giving added control to containerized environments.
Sysdig enhances AWS App Mesh monitoring with the ability to automatically scrape metrics
from the Envoy proxy’s Prometheus endpoint. It allows enterprises to securely collect, alert
on, and visualize the metrics from Envoy. Once collected, Sysdig correlates the data with the
vast amount of metrics and events data that it collects and enriches from across the entire
container infrastructure, including Kubernetes.
With container solutions like EKS, ECS, and Fargate, this happens all the time. Containers
can be moved between nodes and services are scaled up and down, deleting container
instances. You need to be able to identify the root cause of problems and recognize whether
the issue comes from malicious activity or a misconfiguration of the app.
While CloudWatch provides insight using logs, metrics, and events, it was not built for
troubleshooting dynamic containers. The ephemeral nature of containers makes it difficult
to analyze what happened with a security incident after the container is gone. How can you
reproduce the steps taken by the intruder? How did they gain access? What was the impact?
Did they install any malware? Was any data leaked? How far did the attack extend?
Read more about this in Incident response in Kubernetes with Sysdig’s Activity Audit.
Sysdig will deliver notifications to your alerting channels, AWS SNS, or SIEM. This allows you
to consolidate security findings across your container environments so you can view and
manage security alerts, and automate compliance checks across your AWS account. Both
Sysdig Secure and Falco send events to Cloudwatch through FireLens, as seen on Multi-
cluster security with Falco and AWS Firelens on EKS & ECS.
With Sysdig, security teams can resolve issues inside pods and conduct forensics by
reconstructing system activities correlated with AWS context.
Sysdig provides:
• Detailed forensics reports to quickly understand and contain the impact of any security
breach.
• Post-mortem analysis on a container outside production. This lets you analyze forensic
captures and recreate all system activity, even if the EKS, ECS, or Fargate containers are
no longer running.
Sysdig Secure gives organizations immediate and comprehensive cloud security that enables
them to uphold their part of the AWS shared responsibility model. The Sysdig Secure
DevOps Platform allows DevOps and Cloud teams, running container workloads on AWS
container services, to embed security into their workflows, get visibility into performance
and availability, monitor their containers, and implement compliance requirements.
All of these integrations are supported by Sysdig as an AWS Advanced Partner in the AWS
Partner Network (APN) with competencies in container security, monitoring, and DevOps.
Our goal is to help customers securely run any workload on AWS.
There are several different security and monitoring layers that developers, platform
operations, and security teams have to keep in mind as they build cloud applications. The
following table summarizes these layers and highlights the capabilities of AWS container
services, as well as the joint benefits of leveraging the Sysdig Secure DevOps Platform to
further enhance security, compliance, and monitoring for containers and Kubernetes.
Container platforms
Access Control AWS Identity and Access Monitor IAM changes for
and Cloud Management (IAM) unexpected changes and security
Infrastructure threats.
IAM Access Analyzer
Entitlements
Gain visibility into excessive
Management
permissions and entitlements,
(CIEM)
manage and enforce least privilege
access, and simplify audit of access
controls to meet compliance.
Partnership Overview
Sysdig & AWS partner page
Guides
5 Keys to a Secure DevOps Workflow on AWS
Case Studies
Worldpay gains competitive edge with faster delivery of PCI-compliant payment solutions
Webinars
Accelerate Threat Detection Across AWS Cloud and Containers
www.sysdig.com
Copyright © 2021 Sysdig, Inc. All rights reserved. Guide-010 Rev. G 10/21