AWS and Cloudanix team co-authored this blog: Real-Time Threat and Anomaly Detection for Workloads on AWS
Back to Changelog
new release August 12, 2024

Principles of Least Privilege, Remove Permanent Access, Security for Docker Images in CI, and More

We’re thrilled to announce a series of enhancements designed to fortify your cloud environment and streamline your security operations. Last month, we focused on strengthening container security, enhancing identity and access management, and improving your overall user experience. From bolstering your CI/CD pipeline with Docker image vulnerability scanning to optimizing IAM permissions and streamlining notifications, these advancements are a testament to our commitment to providing you with the tools and insights needed to protect your cloud environment effectively.

Secure Your Docker Images in the CI Pipeline (GitHub Actions and Jenkins)

Fortify your CI/CD pipelines with our expanded Docker Image Vulnerability Scanning, now available for GitHub Actions and Jenkins. Proactively identify and block vulnerable images, incorporate Quality Gates, and ensure only secure code reaches production. Findings are now displayed directly within the pipeline and the Cloudanix Console, ensuring a clear view of your container security posture.

Software Screen-Shot GitHub Actions and Jenkins - Scan your docker images

Achieve Principles of Least Privilege for AWS & GCP SSO Setup

IAM Right Sizing capability has been extended to support SSO setup. Cloudanix now supports permissions assignment at AWS IAM Identity Center and Google Workspace for Right Sizing determination. This helps our customers understand over privilege, unused privilege, and make corrections to achieve the principle of least privilege. Gain granular control over user permissions across AWS and GCP, preventing over-privileged access and minimizing risk.

Know more about our Identity and Access Management capabilities >
Gain granular control over user permissions across AWS and GCP, preventing over-privileged access Software Screen-Shot

Remove Permanent Access from Your GCP Environments

With this release, we have introduced support for IAM JIT in GCP — for both IAM and Workspace Users. Our customers using SSO can leverage JIT to elevate and revoke privileges for cloud users. With many levers to control the privileges being requested, such as:

  • Manage JIT eligibility for roles
  • Auto-approve if roles are limited in permissions
  • Define maximum duration of JIT access
  • And more

Elevate and revoke privileges for cloud users using Cloudanix console

Software Screen-Shot

Monitor New AWS Regions Seamlessly

Cloudanix can now monitor all opted-in regions along with default enabled regions. Stay ahead of emerging risks with automatic discovery and monitoring of new AWS regions, without any configuration changes.

Revamped Notifications

Our revamped notifications provide clear and actionable insights, helping you focus on what truly matters. All notifications (Daily Summary, Realtime Notifications) are redesigned to highlight the most impactful findings. With this redesign, our customers can quickly find the right context directly in the email itself.


Cloudanix Blogs

Other Resources


TODO:// is not an option for Cloud Security

cta-image

Security for your Code, Cloud and Data

Cloudanix replaces your 5-6 disjointed security tools within 30 minutes.

Get Started

Blog

Read More Posts

Your Trusted Partner in Data Protection with Cutting-Edge Solutions for
Comprehensive Data Security.

Wednesday, Nov 05, 2025

From Static to Strategic: Modernizing Privileged Access for Cloud Infrastructure

The promise of the cloud – agility, scalability, and innovation – has revolutionized how enterprises operate. Cloud infr

Read More

Tuesday, Sep 30, 2025

Eliminate Standing Access: Introducing JIT Kubernetes for Azure AKS Security

The Security Mandate: Why Permanent Access Fails Mission-Critical AKS Kubernetes has become the operating system of

Read More

Friday, Aug 08, 2025

User Access Review in Cloud Security: A Foundational Guide to Securing Your Cloud Environment

Introduction: The Unseen Gatekeepers of Cloud Security In the rapidly expanding landscape of cloud computing, organi

Read More