AWS and Cloudanix team co-authored this blog: Real-Time Threat and Anomaly Detection for Workloads on AWS
Back to Changelog
improvement May 3, 2023

Security Context, Bitbucket Security and Container Security Upgrades

Filter Events and Identities with Signals

We released “Signals” a few months back to give additional context on what’s going on in your cloud infrastructure. Our users gave additional feedback, and now we are rolling out pre-built Signals as part of the Filter control.

What’s better than just seeing all the signals? The capability to filter them.

Software Screenshot

  • Events signal control dashboard and Identities signal control dashboard

Bitbucket Security

If GitHub is secured, can Bitbucket be far behind?
Last month we announced GitHub security, where we covered three areas:

  • Misconfig: e.g., Outside collaborator is an Admin
  • Events and Threats: e.g., Your private repository became public
  • Secret Detection: e.g., Developer checked in a secret in this Repo, in this file online number x

Now we have rolled out these capabilities to Bitbucket too. Here’s a peek:

  • Bitbucket Events Monitoring

Software Screenshot

  • Bitbucket Secret Scanning

Software Screenshot

Checking secrets into your source code is not ideal — but detecting them instantly is. Cloudanix can alert you in real time if secrets get checked in. Give Bitbucket security a spin and discover more.

Other platforms are coming soon.


Container Security Upgrade

Container Security upgrade to support latest EKS Linux AMIs (AmazonLinux2 & Bottlerocket)
Release: Amazon EKS AMI v20230411


Coming Soon

  • Realtime Events Anomaly support for GCP & Azure
  • Additional Events support for IAM in Azure (e.g., permissions updated for Service Account, User MFA changes)
  • In Secret Scanning Capability – Support for Custom Patterns and Exclusions for existing Patterns, Files or Secrets
  • VM Scanning
  • Attack Path

Scale to Zero Podcast

The more we speak to experts, the more we learn. We have been lucky to find these amazing experts who gave us their time and wisdom to make sense of the queries we had. Take a look:

Find more conversations at ScaleToZero website.


TODO:// is not an option for Cloud Security

Ready to see your graph?

Connect a cloud account in under 30 minutes. See every finding rooted in identity, asset, and blast radius — with a fix path attached.

Book a Demo

Blog

Read More Posts

Your Trusted Partner in Data Protection with Cutting-Edge Solutions for
Comprehensive Data Security.

Tuesday, Apr 14, 2026

Top 15 Cloud Misconfigurations in 2026 - How to Fix Them?

Most cloud breaches today are not the result of sophisticated zero-day exploits. They are the result of misconfiguration

Read More

Monday, Apr 13, 2026

Top 18 Challenges of Cloud Security in 2026

The rapid adoption of cloud computing has brought unprecedented agility and scalability, making it a cornerstone of mode

Read More

Tuesday, Feb 10, 2026

The 2026 CNAPP Compliance Framework: Turning Audit from Crisis to Continuity

Introduction: The Death of the Point-in-Time Audit In the high-velocity cloud landscape of 2026, the traditional app

Read More