Sign in
Categories
Your Saved List Become a Channel Partner Sell in AWS Marketplace Amazon Web Services Home Help

EPAM Syndicate Rule Engine

By: EPAM Systems, Inc. Latest Version: 5.1.0
Linux/Unix
Linux/Unix

Product Overview

An enterprise needs to be sure that the environments used for production or development purposes are compliant with legal, industry, corporate, and customer requirements, standards, and best practices. To efficiently check these environments, businesses face challenges like finding proper tools, performing checks in different directions, analyzing findings and quickly reacting, proper remediation planning, ensuring continuous compliance, and maintaining the cost-effectiveness and optimization of infrastructure.

The EPAM Syndicate Rule Engine solution allows checking and assessing virtual infrastructures on AWS, other cloud providers, and Kubernetes clusters against legal, industry, corporate, and customer requirements, standards, best practices, and rulesets. By default, the solution provides hundreds of security, compliance, utilization, and cost-effectiveness rules, which match world-known standards like GDPR, PCI DSS, CIS Benchmark, and more. The solution helps existing businesses by inventory and assessment of their legacy infrastructure and planned updates. For new businesses, it helps make sure their processes and infrastructure match standards and are effective and safe.

The core of the EPAM Syndicate Rule Engine is a mechanism that scans a specified account to find resources that are not compliant with the applied rule set. These scans include:

  • On-demand scan: A one-time or irregular scan initiated by an operator or a 3rd party system at the moment considered proper by them. This can be used to perform an initial infrastructure assessment or check the readiness to pass a specific type of audit.

  • Scheduled scan: A regular scan performed according to a specific schedule. This can be used to ensure continuous compliance checks, for example, before or after regular product updates.


The result of a scan is a list of vulnerabilities and metadata of the scan that can be processed and analyzed by the customer to define remediation plans and priorities.

Version

5.1.0

Operating System

Linux/Unix, Debian 12

Delivery Methods

  • Amazon Machine Image

Pricing Information

Usage Information

Support Information

Customer Reviews