ATCORP RELEASES CSAS – SECURITY SOFTWARE FOR APPLICATIONS IN THE CLOUD

As government and private sector applications move to “the cloud,” system analysts have few ways of measuring their exposure to known and unknown security risks. ATCorp has announced the availability of CSAS, a software tool that helps software developers and analysts discover actual vulnerabilities and configuration problems in their systems. It allows analysts to evaluate the overall risks those vulnerabilities pose in their specific applications, and mitigate those risks as warranted.

CSAS‘s approach applies to multiple applications:

  • Cloud application security analysis
  • Track system requirements
  • Software testing and validation
  • Impact/fault tree analysis to relate possible modes of attack
  • Attack reconstruction
  • Tracking of software vulnerability in complex applications

Key Ingredients

Unlike competing assessment systems, CSAS provides a framework for mapping high-level security concerns, such as the protection of sensitive data. CSAS‘s models also help compute metrics such as minimum remediation cost or attack complexity.

 Stay Updated To Save Money & Time. Join Our Free Newsletter 
. Indepth Analysis & Opinion       . Interviews      . Exclusive Reports  
. Free Digital Magazines      News & updates      . Event Invitations 
                     
& Much More Delivered To Your Inbox For Free.
Submit
We Will Not Spam, Rent, or Sell Your Information.
All emails include an unsubscribe link. You may opt-out at any time. See our privacy policy.

 

CSAS integrates into existing workflows by employing standards such as the U.S. National Institute of Standards and Technology (NIST) Security Content Automation Protocol (SCAP) and tools such as the NIST National Vulnerability Database (NVD). CSAS‘s tools can query Amazon Web Services (AWS) and OpenStack cloud configurations, as well as examine configuration data on individual cloud machine instances and external databases.

CSAS provides a number of benefits including:

  • Provides more thorough & repeatable analysis, through a structured, hierarchical framework for security models
  • Saves time: performs on-line tests to determine which modeled vulnerabilities are actually present
  • Improves and extends existing host-based security analysis techniques to the cloud and distributed systems
  • Saves labor, pinpoints problems faster; automates routine compliance testing to ensure risks have not been introduced due to configuration changes by the cloud provider or newly-discovered software vulnerabilities
  • Improves system designs: assists with design tradeoffs
  • Improves analytics: computes other tree-derived metrics, such as costs, impact, requirement analysis, or compliance

CSAS is available as a standalone graphical application for security analysts, a command-line edition for automated processing, and a version aimed at software developers that integrates with the Eclipse development environment.

snap

 Stay Updated To Save Money & Time. Join Our Free Newsletter 
. Indepth Analysis & Opinion       . Interviews      . Exclusive Reports  
. Free Digital Magazines      News & updates      . Event Invitations 
                     
& Much More Delivered To Your Inbox For Free.
Submit
We Will Not Spam, Rent, or Sell Your Information.
All emails include an unsubscribe link. You may opt-out at any time. See our privacy policy.

 
Close
Stay Updated To Save Money & Time. Join Our Free Newsletter. 
. Indepth Analysis & Opinion       Interviews          . Exclusive Reports 
. Free Digital Magazines        . News & updates        . Event Invitations
& Much More Delivered To Your Inbox For Free. 
Submit
We Will Not Spam, Rent, or Sell Your Information.
All emails include an unsubscribe link. You may opt-out at any time. See our privacy policy.
 
Close