Fugue, the company transforming cloud security to help organisations innovate faster, announces it has added support for Google cloud to its multi-cloud security platform.

With Fugue, cloud engineering and security teams can secure their entire cloud development lifecycle (CDLC)—from infrastructure as code to production—across their Amazon Web Services (AWS), Microsoft Azure, and now Google cloud environments using the same Cloud Security Posture Management (CSPM) solution.

Multiple cloud platforms

Fugue automates immediate and continuous security visibility and compliance reporting for cloud development and operations to prevent misconfiguration vulnerabilities and streamline previously time-consuming and resource-intensive tasks. Fugue support for Google cloud initially includes 59 resource types and audit and reporting capabilities for the CIS Google cloud computing platform foundations benchmark, CIS Controls, CSA CCM, GDPR, HIPAA, ISO 27001, NIST 800-53, PCI, SOC 2, and custom enterprise policies.

Fugue provides us with the ability to conduct comprehensive cloud security audits fast"

Fugue provides us with the ability to conduct comprehensive cloud security audits fast, and now with Google cloud support, we can apply the same rules consistently across multiple cloud platforms,” said Alfonso Cabrera, Director of Platform Engineering at Red Ventures.

Dynamic cloud environments

Keeping cloud infrastructure secure and measuring adherence to security standards used to be time-consuming and highly manual. Fugue has automated these processes to provide immediate and continuous visibility into highly dynamic cloud environments, helping ensure that we continue to innovate at a fast pace without compromising on security.”

Fugue covers security and compliance at every stage of the CDLC—from Terraform and AWS CloudFormation infrastructure as code checks to continuous runtime protection and compliance auditing and reporting. Fugue provides deeper protection against the kinds of advanced multi-resource misconfigurations that are playing a larger role in modern cloud attacks and are often overlooked by other tools and compliance frameworks.

Deploying cloud infrastructure

More enterprise organisations are using multiple cloud service providers as code tools"

More enterprise organisations are using multiple cloud service providers and infrastructure as code tools, and their teams need a way to move faster and more securely, regardless of which clouds they’re using, or how they’re developing and deploying cloud infrastructure,” said Josh Stella, Co-Founder and CEO of Fugue.

With the addition of Google cloud support, teams can now use Fugue to apply the same compliance rules and custom security policies consistently across their entire cloud footprint and cloud development lifecycle—without slowing down the pace of innovation.”

Inspecting configuration details

With Fugue, every team—from developers to ops to security and compliance—shares a single source of trust in what’s allowed in their cloud environment using the Fugue Rules Engine, built with Open Policy Agent, the open standard for a policy as code.

Because Fugue takes continuous snapshots of cloud configuration state, all teams operate under a single source of truth in what’s running in their environment at all times. Fugue’s interactive cloud infrastructure maps enable teams to zoom in to inspect configuration details and compliance violations and zoom out to see the big picture of their environment, and export diagrams to include with audits.

Download PDF version Download PDF version

In case you missed it

Anviz Global expands palm vein tech for security
Anviz Global expands palm vein tech for security

The pattern of veins in the hand contains unique information that can be used for identity. Blood flowing through veins in the human body can absorb light waves of specific wavelen...

Bosch sells security unit to Triton for growth
Bosch sells security unit to Triton for growth

Bosch is selling its Building Technologies division’s product business for security and communications technology to the European investment firm Triton. The transaction enc...

In age of misinformation, SWEAR embeds proof of authenticity into video data
In age of misinformation, SWEAR embeds proof of authenticity into video data

The information age is changing. Today, we are at the center of addressing one of the most critical issues in the digital age: the misinformation age. While most awareness of thi...

Quick poll
What is the most significant challenge facing smart building security today?