Cloud engineering and security teams have traditionally used one policy framework to check infrastructure as code, and another for their cloud environment. Using two sets of policies for different stages of the development lifecycle leads to security gaps and a ton of wasted time reconciling and remediating.
Fugue IaC changes this by enabling teams to use one set of cloud infrastructure policies to check infrastructure as code pre-deployment and their cloud environment post-deployment. Using Fugue, teams can deliver secure infrastructure 3X faster using 50% fewer engineering hours.
In this session, Ricardo Green (Principal Solutions Engineer) will walk through how Fugue streamlines cloud security across the development lifecycle. You’ll learn how you can:
Leverage hundreds of pre-built policies mapped to compliance families such as SOC 2, NIST 800-53, and CIS Foundations Benchmarks.
Develop custom policies using Open Policy Agent (OPA) — from simple rules to sophisticated multi-resource policies
Apply your policies to infrastructure as code in development and CI/CD —and your cloud runtime environment — from one place
This session will use examples for Terraform and AWS, but it will be relevant if you’re using AWS CloudFormation for infrastructure as code, and Microsoft Azure and Google Cloud environments.
Session Speaker Bio:
Your privacy is important to us and your information will be kept confidential.