Varonis Adds Automated Remediation for AWS to Industry-Leading DSPM Capabilities

The DSPM leader expands AWS data security offering with new features to automatically find and fix critical misconfigurations, remove identity-related risks, and eliminate public data exposure.
Nathan Coppinger
3 min read
Last updated June 12, 2024
AWS Remediation

Today, we’re excited to announce new remediation capabilities for AWS that can help organizations create a self-securing cloud environment. Varonis automates actions that have high-security value and zero business impact, such as blocking public access to sensitive S3 buckets, removing stale users and roles, and deleting inactive access keys.

In this blog, we’ll outline our new updates to Varonis for AWS. If you happen to be at AWS re:Inforce this week, stop by booth 303 for a live demo! 

 

Active vs. passive DSPM

Many organizations turn to DSPM to give them more visibility into where their sensitive data exists and where it’s at risk. But where most DSPM vendors stop is with surfacing findings – most can’t fix the issues they uncover. This passive DSPM approach burdens IT and security teams with more work to configure third-party workflows or even to manually sift through findings to fix them.

Varonis takes an active approach to DSPM, building remediation into our Data Security Platform. Varonis’ industry-first automation for AWS can remediate exposure from multiple angles:

  1. Misconfigurations (e.g., enforce encryption at rest)
  2. Identity-related exposures (e.g., remove stale access keys)
  3. Public data exposure (e.g., apply public access block on all sensitive buckets)

Automatically block public access to S3 buckets. 

AWS gives organizations the flexibility and power to create and proliferate cloud data workloads faster than ever. However, with complicated access policies and complex configurations, it can be difficult for security teams to keep up.

With Varonis’ automated remediation, security teams can automatically apply public access blocks on all S3 buckets containing sensitive data. You can do this remediation in bulk, on a schedule, or continuously so that you automatically stay ahead of new exposures.

A detailed activity audit trail can also help you detect when users make buckets public so you can address risk as soon as it happens.

Automatically apply public access blocks to S3 buckets. 

Remove public access-1

Automatically apply public access blocks to S3 buckets. 

Remove stale users, roles, and access keys. 

Once an attacker has an identity, they have access to data, so it’s important to eliminate stale or unneeded users, roles, and access keys to close off that attack path.

Varonis maintains a complete inventory of users, roles, and access keys in your AWS environment and identifies which are stale based on a customizable inactivity period. Varonis then surfaces the stale entities in the IaaS dashboard and creates reports for easy review.

From the dashboard, you can drill down and select the stale entities you want to remove from your environment. You can then use Varonis' remediation capabilities to promptly eliminate them from your AWS account. Set up reports to send to your cloud security architects on a regular basis to review and approve entities for removal by Varonis.

This granular control helps close offboarding gaps, identify identity-related threats, and quickly reduce your blast radius.

Get a centralized overview of your AWS environment's stale users, roles, and access keys. 

IaaS dashboard 2

Get a centralized overview of your AWS environment's stale users, roles, and access keys. 

Automatically remediate critical AWS misconfigurations. 

While AWS offers flexibility, setting up a secure environment can be challenging, leading to significant security and compliance risks if not properly addressed. Even after initial setup, ongoing vigilance is critical as configuration drift can occur.

Varonis continuously monitors your AWS environment to proactively surface misconfigurations that may expose your sensitive data to risk and non-compliance. Rather than being left with a list of issues to fix yourself, Varonis enables you to automatically and continuously fix configuration issues as they arise.

Use Varonis to find and automatically remediate critical misconfigurations across AWS, such as:

  • Missing password policies
  • S3 object ownership enforcement
  • Missing encryption at rest

With these remediation capabilities, you can proactively maintain a secure AWS environment and prevent configuration drift.

Automatically fix critical AWS misconfigurations

AWS miconfiguration remediation

Automatically fix critical AWS misconfigurations

Discover shadow databases with Elastic Block Store support. 

Spinning up an unmanaged database on EBS volumes attached to EC2 instances is relatively simple. However, these databases are often created without the security team’s knowledge. With no way to uncover shadow databases and understand what sensitive data resides in them, these databases go unseen, waiting to be breached.

Varonis now supports sensitive data discovery and monitoring for EBS. Now, you can:

  • Discover shadow databases running on EC2 instances
  • Surface orphaned snapshots 
  • Identify backups and dumps stored in S3 and link them to the relevant database 

Customers now have a clear view of all their databases, including unmanaged shadow databases. 

See an overview of the databases in your environment from a single console.

Shadow database management console

See an overview of the databases in your environment from a single console.

Maintain comprehensive coverage with Amazon Redshift support. 

Many enterprises rely on Amazon Redshift to analyze critical business data, but it can be difficult to understand where sensitive data lives, where it's at risk, and how it’s being used within the data warehouse.

By expanding Varonis’ support for structured data to data found within AWS Redshift, organizations can be confident their critical data warehouses are secure. Varonis enables: 

  • Data discovery and classification 
  • Permissions and exposure analysis 
  • Misconfiguration management 
  • Activity monitoring and threat detection 

With user and role permissions mapped across all Amazon Redshift warehouse instances, you can easily understand and reduce your AWS blast radius.

2024-06-04 11_48_14-

With user and role permissions mapped across all Amazon Redshift warehouse instances, you can easily understand and reduce your AWS blast radius.

Try Varonis for AWS for free. 

Available on the AWS Marketplace, the Varonis Data Security Platform helps security teams continuously monitor and improve their data security posture in real time.

Request a demo today and visit us at AWS re:Inforce to see the solution in action.

What should I do now?

Below are three ways you can continue your journey to reduce data risk at your company:

1

Schedule a demo with us to see Varonis in action. We'll personalize the session to your org's data security needs and answer any questions.

2

See a sample of our Data Risk Assessment and learn the risks that could be lingering in your environment. Varonis' DRA is completely free and offers a clear path to automated remediation.

3

Follow us on LinkedIn, YouTube, and X (Twitter) for bite-sized insights on all things data security, including DSPM, threat detection, AI security, and more.

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.

Keep reading

Varonis tackles hundreds of use cases, making it the ultimate platform to stop data breaches and ensure compliance.

discover-shadow-databases-with-varonis’-industry-leading-dspm
Discover Shadow Databases With Varonis’ Industry-Leading DSPM
Varonis now enables organizations to close significant security gaps by discovering and remediating “shadow” databases across AWS environments.
change-these-7-security-settings-after-creating-a-new-aws-account
Change These 7 Security Settings After Creating a New AWS Account
Use these seven AWS security best practices for simple configuration changes on a new AWS account.
introducing-the-aws-access-graph-to-find-and-fix-cloud-security-issues
Introducing the AWS Access Graph to Find and Fix Cloud Security Issues
Tighten your cloud security posture with the ability to automatically visualize the AWS blast radius and cut off access paths to data.
what's-new-in-varonis:-october-2024
What's New in Varonis: October 2024
Discover Varonis' latest features, including new automated remediation policies, Box Zones support, autonomous database classification, and more.