How does HashiCorp Boundary pair with Cmd's eBPF monitoring solution for Linux?
With admins accessing Production Linux from home, you need to do better than just perimeter-level security. Cmd makes it easy to up-level protection inside mission-critical environments with better visibility, strong controls, and simple policies that keep data safe and stop breaches.
Production Linux environments are typically protected by VPNs, firewalls, WAFs, and all sorts of edge technologies. All too often, however, once you get inside the perimeter it’s the wild west. That’s why issues like lateral movement and privilege escalation can be so hard to spot – many companies just don’t have controls in place to enforce security policy after an attacker gets inside – or even the visibility to see it.
With a fully remote workforce, this problem gets compounded by the fact that perimeter bottlenecks are forcing security teams to open up access in ways they normally wouldn’t. As a result, you could be exposed in ways you don’t want to be.
As an industry, we’re all scrambling a bit right now. Employees are working from home, plans are being re-assessed, and meanwhile every security professional knows that amidst this chaos the adversary will be looking to take advantage of the situation. Security needs to stay on top of things, quickly.
Attackers thrive on chaos, which is why security remains a critical function even in these chaotic times. Phishing attacks are focused on your cloud, leading to a need for better privileged access control. Meanwhile, algorithms trying to detect abnormal behavior using geolocation and time-of-day all need to be retooled, otherwise your SOC will be overwhelmed by alert fatigue that’s all too common with a remote workforce. Cmd can help with all this.
We’re all in this together, which is why we need to learn from each other. Cmd customer and Flexport CISO Kevin Paige recently led a virtual roundtable on the impact of COVID-19 and how the transition to a remote workforce is impacting security teams. Read some of the highlights or check out the whole discussion here.
Lack of visibility and control inside the cloud or datacenter perimeter is not a new challenge. Check out this whitepaper, published by SANS, describing some of the core best practices that organizations must take to up-level security in Production Linux environments. Want to learn more? Listen to the author of this whitepaper, SANS instructor and security specialist Matt Bromiley discuss these topics on his recorded webcast.
Cmd provides the fastest, easiest way to know what’s happening in your Linux environment, who’s logging in, and what they are doing.
Activate Your Free Account arrow_forward