Welcome to the Bridegecrew. You'll find comprehensive guides and documentation to help you start working with Bridegecrew as quickly as possible, as well as support if you get stuck. Let's go!
Operating a large scale cloud environment makes it practically impossible to keep track on every running resource. Gaining quick visibility to the latest configuration specs on running resources requires navigating through tedious cloud console pages or worse, inventory exports into spreadsheets.
As a cloud infrastructure team your aren't only responsible for the deployed cloud resources in your environment, you need to constantly keep an eye on the new resources provisioned by developers from other teams.
To enable more comprehensive coverage while scanning for misconfigurations based on external modules, Bridgecrew now supports external module scanning as well as full variable rendering. What this means is that whenever your Terraform files will rely on modules or variables, Bridgecrew will build a full dependency graph of those modules and variables, render the correct values and evaluate them against the baseline.
If you're using Terraform Cloud to operate and manage your cloud provisioning lifecycle, you're probably aware of the benefits of predictable deployment outcomes. One important pillar of that process is ensuring security and compliance standards are met on every resource block.
There are endless options to provision and configure resources in the public cloud. While cloud provider consoles and SDKs register changes in standard logging solutions like AWS CloudTrail or Google's StackDriver, it's becoming increasingly difficult to use these logs to keep track of meaningful configuration changes. IaC introduces an additional layer of complexity by storing configuration changes in git logs and state files.
Fixing misconfigured cloud resources isn't just about replacing configuration variables. Before changing existing configurations, we should make sure we know how those configurations are currently being used throughout our IaC dependencies.
It's been a long time since we upgraded the experience of our native Incidents filters.
Developing secure IAM requires iterative and ongoing effort. That's why we're adding continuous IAM right-sizing insights to Bridgecrew's core platform. With IAM Insights, Bridgecrew continuously collects permission entitlement configurations and evaluates them against actual activity telemetry. The result is actionable, codified recommendations on how to reduce the permission of existing IAM entities including users, roles, groups, and policy docs.
Investigating resource errors becomes a lot simpler with Bridgecrew's new UI and metadata around resources. By including a full array of metadata entities pulled from cloud provider APIs and related configurations defined using IaC, Bridgecrew hopes to make it easier to understand risk and be able to action errors faster.
Show off your cloud security efforts with Bridgecrew's README badges!