Sysdig Secure for cloud
Because modern cloud applications are no longer just virtualized compute resources, but a superset of cloud services on which businesses depend, controlling the security of your cloud accounts is essential. Errors can expose an organization to risks that could bring resources down, infiltrate workloads, exfiltrate secrets, create unseen assets, or otherwise compromise the business or reputation. As the number of cloud services and configurations available grows exponentially, using a cloud security platform protects against having an unseen misconfiguration turn into a serious security issue.
Check Sysdig Secure - Secure for cloud to review the features provided per cloud.
Multiple Installation Options
Sysdig Secure for cloud is available on a variety of cloud providers, with simplified installation instructions available from the Get Started screen.
Supported cloud providers at this time are:
Native template deployment for
Helm Chart based (feature limited)
Core component for Sysdig Secure for Cloud, is called cloud-connector, which is also available through following methods:
Note: Installing this component will only allow you threat detection and image scaning features, although together with SysdigCompliance IAM role, it can handle Compliance and Identity and Access Posture too.
- Subscription Type Cloud Limitations
- Does our installation method not adapt to your infrastructure? Fill up our Secure for Cloud Questionnaire and use the public Github Repositories to let us help you. You can also Contact us through our usual support channel.
Was this page helpful?
Glad to hear it! Please tell us how we can improve.
Sorry to hear that. Please tell us how we can improve.