Fugue - Experts & Thought Leaders

Latest Fugue news & announcements

Fugue brings Kubernetes security checks to their SaaS Platform and Open Source Regula Project

Fugue, a cloud security SaaS company, announces support for Kubernetes security prior to deployment. Using policy as code automation built on the open source Regula policy engine, Fugue provides a unified platform for securing infrastructure as code (IaC) and cloud runtime environments using a single set of policies, saving cloud teams significant time and ensuring consistent policy enforcement across the development life cycle. With this release, organisations can now use Fugue to secure infrastructure as code for Kubernetes, Terraform and AWS CloudFormation. Fugue has also added rules that align with the CIS Kubernetes Benchmark. Cloud resource configurations A sponsor of the event, the company will be demonstrating Fugue virtually at KubeCon + CloudNativeCon North America, through Oct. 15. “Engineering teams are increasingly using a mix of container orchestration, virtual machines, and serverless across cloud providers, and using different policies for everything wastes a tremendous amount of time and invites vulnerabilities to slip through the cracks,” said Josh Stella, Co-Founder and CEO of Fugue. “Teams need a unified way to secure everything at every stage of the development life cycle, and with support for Kubernetes, they can secure all of the infrastructures as code and apply those policies to their running cloud environments.” Fugue provides centralised IaC security management for cloud resource configurations, container orchestration, and containers. Testing custom policies Teams can use Fugue to establish IaC security visibility across their organisation Teams can use Fugue to establish IaC security visibility across their organisation. Fugue’s open source Regula policy engine provides tooling for engineers to check their IaC configurations locally and for developing and testing custom policies, including those that can check for multi-resource vulnerabilities. Fugue and Regula use Open Policy Agent (OPA), the open standard for a policy as code. OPA is a Cloud Native Computing Foundation (CNCF) graduated project. The Fugue SaaS platform and Regula project include hundreds of pre-built policies mapped to the CIS Foundations Benchmarks for Amazon Web Services (AWS), Microsoft Azure, Google Cloud, and Kubernetes. Cloud security products Additionally, Fugue provides compliance mappings for SOC 2, NIST 800-53, GDPR, PCI, HIPAA, ISO 27001, CSA CCM, CIS Controls, CIS Docker, and the Fugue Best Practices Framework to catch misconfigurations that compliance may miss. The Fugue API and CLI are first-class citizens in the product, enabling engineers to build automated IaC checks into Git workflows and CI/CD pipelines to prevent misconfiguration vulnerabilities in deployments. Unlike with other cloud security products, teams can use those same policies to ensure cloud runtime environments stay secure post-deployment, including cloud resources deployed outside of IaC and CI/CD pipelines.

Fugue announces the release of Regula version 1.0 for open source infrastructure as code (IaC) security

Fugue, the company helping organisations innovate faster and more securely in the Cloud, announced a 1.0 release for Regula, an open source policy engine for infrastructure as code (IaC) security. The release includes comprehensive support for common IaC tools, such as Terraform and AWS CloudFormation, pre-built libraries with hundreds of policies that validate Amazon Web Services (AWS), Microsoft Azure, and Google Cloud resources, and new developer tooling to support custom rules development and testing with Open Policy Agent. This latest release further advances Fugue’s leadership in innovating on policy as code for IaC and the cloud infrastructure runtime. Regula, open source engine for IaC security Regula supports a broad set of IaC inputs, including Terraform HCL, Terraform plan JSON, AWS CloudFormation, and Serverless Application Model templates. Extensive rule libraries check for common security and compliance violations and advanced, multi-resource misconfigurations, and can detect when required resources are missing. Regula supports standardised output formats, such as JUnit, Test Anything Protocol (TAP), and JSON, allowing it to integrate seamlessly with CI/CD tools and testing frameworks, including Jenkins, CircleCI, Travis CI, and Conftest. Infrastructure as code (IaC) Infrastructure as code presents cloud teams with the opportunity to shift left on cloud security pre-deployment" Cloud and security engineers can use their Regula policies in the Fugue SaaS platform to check their AWS, Microsoft Azure, and Google Cloud environments, giving them a unified policy engine for securing the entire cloud development lifecycle (CDLC) from IaC through deployment and runtime.  “Infrastructure as code presents cloud teams with the opportunity to shift left on cloud security pre-deployment, and they need better tooling to develop and test policies, integrate them into their CI/CD workflows, and apply those same rules to their cloud runtime environments,” said Josh Stella, Co-Founder and CEO of Fugue. Open policy agent framework Josh adds, “These new Regula capabilities and policies make it easier than ever for cloud teams to secure their IaC and apply policy consistently across the CDLC and across cloud platforms, and avoid the overhead of maintaining and reconciling different policy frameworks.” Regula utilises the Cloud Native Computing Foundation’s Open Policy Agent framework, with expressive and powerful rules written in the Rego language. Developers can create their own custom rules to meet organisational requirements, and Regula includes additional tooling for running tests on these rules. Rules can be waived to designate exceptions for specific resources or disabled entirely to fit an organisation's needs. Out-of-the-box support Regula provides out-of-the-box support for the CIS Foundations Benchmarks and additional Regula policies check for cloud vulnerabilities that compliance frameworks can miss, such as dangerously permissive AWS IAM policies, Lambda function policies allowing global access, EBS volumes with encryption disabled, and untagged cloud resources.

Fugue announces IaC Security for AWS CloudFormation in Regula

Fugue, the company helping organisations innovate faster and more securely in the cloud, announced support for AWS CloudFormation in Regula, the open-source infrastructure as code (IaC) policy engine. Cloud engineering and security teams can now use Regula to secure their AWS CloudFormation and Terraform configurations before deployment and apply those same rules to running cloud environments using the Fugue platform to secure the entire cloud development lifecycle. Expanding Regula capabilities represents Fugue’s continued leadership in innovating on the policy as code for IaC and running cloud infrastructure since 2015. Ideal for multi-cloud environments Regula is ideal for organisations with DevOps teams that use both AWS CloudFormation and Terraform and those operating multi-cloud environments. Regula is the only AWS CloudFormation security tool that can address vulnerabilities involving multiple resources, and the only one that helps teams meet the CIS AWS Foundations Benchmarks 1.2.0 and 1.3.0. Regula easily integrates into CI/CD pipelines and enables pre-commit IaC checks and provides pull request feedback Regula easily integrates into CI/CD pipelines and enables pre-commit IaC checks and provides pull request feedback. Fugue provides examples of Regula working with GitHub Actions for CI/CD. Code security requirements “At Cadwell, we needed an effective way to check our infrastructure as code to ensure our cloud infrastructure deployments are secure so we can move faster in the cloud with confidence,” said Sawyer Ward, Enterprise Support Specialist at Cadwell Industries, Inc. “Regula is ideal for our infrastructure as code security requirements, and the ability to apply those same rules to our cloud environment with Fugue means we can keep our infrastructure in continuous compliance and avoid the risks and overhead of maintaining multiple policy frameworks.” Independent working software While Regula works independently of Fugue, teams can use Fugue to apply the same Regula rules to assess the security posture of their running AWS, Azure, and Google Cloud cloud infrastructure environments, eliminating the investment and cloud risk associated with using and reconciling different policy frameworks for different stages of the cloud development lifecycle and different cloud platforms.   Unified cloud policy framework Regula can be used across cloud platforms at every stage of the cloud development lifecycle “Companies operating at scale in the cloud need a policy as code framework that’s flexible, works with the leading infrastructure as code tools, and can be used across cloud platforms at every stage of the cloud development lifecycle,” said Josh Stella, co-founder, and CEO of Fugue. “By extending Regula support to AWS CloudFormation, cloud engineering and security teams now have a unified cloud policy framework that works with their tools and workflows, giving them the confidence to move faster in the cloud—without breaking the rules needed to keep cloud infrastructure secure and in compliance.” Rules are user-defined Regula’s rule library checks for a wide variety of cloud misconfiguration vulnerabilities, such as dangerously permissive AWS IAM policies and security group rules, S3 buckets without “block public access” options enabled, Lambda function policies allowing global access, VPCs with flow logs disabled, EBS volumes with encryption disabled, and untagged cloud resources. Regula supports user-defined rules using the Rego query language developed by the Open Policy Agent project and includes helper libraries that enable users to easily build their own rules that conform to enterprise policies. Fugue created and open-sourced Fregot, a tool that enables developers to easily evaluate Rego expressions, debug code, and test policies. 

Quick poll
What is the most significant challenge facing smart building security today?