
Overview
The Sonrai Security platform reveals cloud blindspots and provides remediation to prevent high impact attacks. Its technology unifies four types of cloud risk analytics and remediation:
Identity Privilege & Access (CIEM) The Toxic Permissions Analyzer uncovers every overprivileged human and machine identity across all AWS accounts. Sonrai graphs every asset, resource and permission across your cloud, to reveal where privileges compound to create pathways to your data. See a full picture of effective permissions, including what identities can do after crossing accounts or clouds. Use Sonrai to monitor and alert on separation of duties, toxic combinations, dormant identities, and enforce Least Privilege.
Data Protection & Classification (DSPM) Continuously monitor critical data sitting inside object stores like AWS S3 and database services. Suspicious access activity or changes in access rights creating new risks are automatically flagged and remediated. Sonrai offers data discovery, data tagging, custom classification, Least Access policies and continuous monitoring of your most sensitive assets. Pass audits, meet compliance and guard the heart of your organization with Sonrai.
Agentless Vulnerability Scanning & Inspector Enrichment (CWPP) Leverage the Sonrai Security agentless scanner or enrich your own with identity and data risk amplifiers and a unique severity score. This built-in prioritization of vulnerabilities posing the greatest threat to your data, whether on the host or via identity lateral moment allows your team to focus their efforts and preserve resources. Enrich Amazon Inspector data with Sonrai context.
Custom Cloud Posture Management and Compliance (CSPM) Continuous monitoring of drift away from baseline for misconfigurations, data movement, and network access is detected and remediated. Check your security posture against pre-built or custom-built frameworks so you pass every audit and know that your AWS environment does not miss a new threat.
Highlights
- Unique ability to not only detect toxic policies allowing identities risky access, but detail the exact permission granted out of the 40,000+ possible actions (e.g. read, write, delete.)
- Attack path analysis: Sonrai simulates every possible attack path leading to data in your cloud and rebuilds the model each night to keep up with your evolving cloud.
- Deep data monitoring of S3, RDS, DynamoDB, EBS, Vault and other datastores, and the ability to track data movement, uncover risk to PII, geo-residency and data privacy controls. Operationalized cloud security: organizations are split into organized and automated workflows to ensure remediation alerts go to the specific team responsible. Integrations with Jenkins, ServiceNow, Slack, Jira, Teams, and more.