CIOApplications
static-image
  • Home
  • Applications
      • Bioinformatics
      • Business Continuity
      • Business Intelligence
      • Chatbot
      • Collaboration
      • Custom Software Development
      • CRM
      • Enterprise Reporting Software
      • GRC
      • Human Resource
      • Indoor Positioning
      • InsurTech
      • Intellectual Property
      • IT Operations Management
      • IT Service Management
      • Low Code Platform
      • Maintenance Management
      • Managed IT Services
      • MarTech
      • Master Data Management
      • Mobile Application
      • Order Management
      • Parking Management
      • Procurement Tech
      • Publishing Software
      • Remote Monitoring
      • RFID
      • Sales Tech
      • SAS
      • Software Testing
      • Task Management
      • Unified Communications
      • Workflow
      • Workplace Management
  • Verticals
      • BioTechnology
      • Construction
      • Contact Center
      • Education
      • Fintech
      • Food and Beverages
      • Government
      • Healthcare
      • Legal
      • Logistics
      • Manufacturing
      • Travel and Hospitality
      • Utilities
  • Technologies
      • Agile
      • API
      • Artificial Intelligence
      • Blockchain
      • CAD/CAM
      • Cloud
      • Cyber Security
      • Data Analytics
      • Data Center
      • Digital Transformation
      • Graphics
      • IoT
      • Machine Learning
      • Machine Vision and Imaging
      • Predictive Analytics
      • Robotic Process Automation
      • Simulation
      • Smart Labelling
  • Eco System
      • Adobe
      • Amazon
      • Esri
      • Google
      • IBM
      • Infor
      • Kubernetes Partner
      • NetSuite
      • Oracle
      • PTC Partners
      • Qlik Partner
      • Salesforce
      • ServiceNow
      • SiteCore
      • VMware
  • Vendors
  • News
  • Newsletter
  • Whitepaper
  • conferences
  • About Us
  • Specials

  • Menu
      • Business Continuity
      • Chatbot
      • Cloud
      • Collaboration
      • Contact Center
      • Esri
      • Human Resource
      • InsurTech
      • IT Service Management
      • Machine Learning
      • Manufacturing
      • Master Data Management
      • Procurement Tech
      • Robotic Process Automation
      • Salesforce
      • ServiceNow
      • Simulation
      • Software Testing
  • Contact Center
  • Collaboration
  • Chatbot
  • Esri
  • Simulation
  • InsurTech
  • Human Resource
Specials
  • Specials

  • Business Continuity
  • Chatbot
  • Cloud
  • Collaboration
  • Contact Center
  • Esri
  • Human Resource
  • InsurTech
  • IT Service Management
  • Machine Learning
  • Manufacturing
  • Master Data Management
  • Procurement Tech
  • Robotic Process Automation
  • Salesforce
  • ServiceNow
  • Simulation
  • Software Testing
×
#

CIO Applications Weekly Brief

Be first to read the latest tech news, Industry Leader's Insights, and CIO interviews of medium and large enterprises exclusively from CIO Applications

Subscribe

loading
  • Home
  • Security
Editor's Pick (1 - 4 of 8)
left
Leadership Framework for Building Elite Teams

Leadership Framework for Building Elite Teams
Douglas Duncan, CIO, Columbia Insurance Group

Four Reasons Why You Need a Third-Party Security Assessment

Four Reasons Why You Need a Third-Party Security Assessment
Jeff Cann, CIO, Encore Electric, Inc.

Information Security Against Cyber Attacks

Information Security Against Cyber Attacks
Brad Peterson, EVP & CIO, Nasdaq

 The Technology Project Life Cycle: Lessons Learned

The Technology Project Life Cycle: Lessons Learned
Tony Laska, SVP-CIO, BrickStreet Insurance

Implementing a Cybersecurity Program - The Journey of True Partnership with IT

Implementing a Cybersecurity Program - The Journey of True...
Maurice Edwards, Senior Vice-President Enterprise Risk, Mattress Firm

Information Governance = Data Governance + Disclosure

Information Governance = Data Governance + Disclosure
Tera Ladner, Director, Information Governance, Aflac

For DDoS-Hope is NOT a Strategy!

For DDoS-Hope is NOT a Strategy!
Jon Murphy, GVP-IT Security, Ocwen Financial Corporation

Do You Suffer from Cloud Strategy Deficiency (CSD)?

Do You Suffer from Cloud Strategy Deficiency (CSD)?
Hiba S. Sharief, Vice President, IT, Oportun

right

Thank you for Subscribing to CIO Applications Weekly Brief

Bridgecrew's New Security Research Reveals Nearly One in Two Terraform Registry Modules is Misconfigured

By CIO Applications | Friday, July 31, 2020

Tweet

Idan Tendler, Co-founder and CEO, Guy Eisenkot, Co-founder and VP of Product and Barak Schoster, Co-founder and CTO

IaC, popularized by open-source frameworks such as HashiCorp's Terraform, is utilized to provision cloud resources with improved immutability and scalability. However, security is still behind to catch up with emerging technology.

FREMONT, CA: Bridgecrew, a San Francisco-based company which came out of stealth this April, published its first research report to analyze the infrastructure-as-code (IaC) security ecosystem. The State of Open Source Terraform Security report points out the areas in need for improvement.

The IaC Security Challenge

IaC, popularized by open-source frameworks such as HashiCorp's Terraform, is utilized to provision cloud resources with improved immutability and scalability. However, security is still behind to catch up with emerging technology.

"At a time when organizations are embracing DevSecOps principles more and more, we were surprised by the gaps in security coverage and awareness at the IaC level. Teams have relied on cloud providers' native tools and traditional security posture management solutions, but they aren't getting the commit to cloud visibility they need," said Guy Eisenkot, Co-founder and VP of Product, Bridgecrew.

IaC adds another layer of complexity to already intricate native-cloud environments, which makes it difficult to know if security controls are in place, and where they should be monitored.

Bridgecrew perceives this challenge as an access and knowledge gap. The San Francisco-based startup has been helping teams bridge those gaps with its open-source tools, SaaS platform, and now with research like this.

The Research

Bridgecrew utilized Checkov, its open-source IaC security tool, to scan the Terraform Registry, the largest public resource of IaC modules. The report examines compliance trends across categories like encryption, networking, and cloud providers. 

Here are some top discoveries:

• 44 percent of modules used to provision Azure, AWS, and Google Cloud resources are misconfigured.
• Misconfigured modules have been downloaded more than 15 million times since 2017.
• Q2 2020 had the highest module growth and an increase in misconfigurations.

"IaC compliance is a huge area of risk for cloud-native organizations, but it's also a huge opportunity in terms of both security and cost-management. Knowing about the risks is the first step to seizing that opportunity," remarked Barak Schoster, Co-founder and CTO, Bridgecrew.

tag

SaaS

AWS

Weekly Brief

loading
ON THE DECK

Top Vendors

Field Service 2021

Top Vendors

Previous Next
Tweets by CIOApplications

Read Also

EPAM to Acquire PolSource to Scale its Salesforce Capabilities and Expand into New Markets

EPAM to Acquire PolSource to Scale its Salesforce Capabilities and Expand into New Markets

Destaco Launches TC1 Manual Tool Changer for Cobots

Destaco Launches TC1 Manual Tool Changer for Cobots

Four Business Challenges in Procurement

Four Business Challenges in Procurement

Five Trends Set to Transform the Contact Center

Five Trends Set to Transform the Contact Center

How the Weaponization of Artificial intelligence (AI) can Impact the Future of Humanity

How the Weaponization of Artificial intelligence (AI) can Impact the Future of Humanity

Four Benefits of Cloud-Based Business Budgeting Software

Four Benefits of Cloud-Based Business Budgeting Software

Loading...

I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info

Copyright © 2021 CIOApplications. All rights reserved. Registration on or use of this site constitutes acceptance of our Terms of Use and Privacy Policy |  Sitemap  |  Subscribe |  About Us

follow on linkedin follow on twitter follow on rss
This content is copyright protected close

However, if you would like to share the information in this article, you may use the link below:

https://www.cioapplications.com/news/bridgecrew-s-new-security-research-reveals-nearly-one-in-two-terraform-registry-modules-is-misconfigured-nid-6105.html