Access Control

Complete Access Control for Cloud Workloads and Cloud Native Apps

Establish and monitor access control measures for cloud workloads and cloud native applications. Enterprises leverage Twistlock across the cloud native stack to protect their underlying hosts, Docker, and Kubernetes while integrating with IAM and secrets management tools along with other core technologies.

Real Time Kubernetes Audit Event Stream Processing

Twistlock is a Kubernetes audit dynamic backend, consuming all the audit events from all your clusters. Create powerful, environment specific stream parsers right in the Twistlock UI or choose from our library of recommended filters, updated via the Intelligence Stream. Detect and alert on events like running privileged pods, mounting host namespaces, and any other events you care about.

Integrated, Full-Spectrum Secrets Management

Twistlock built the authorization framework used in Docker and OpenShift, as well as the pluggable secrets management capability within Docker Swarm. Twistlock integrates with the secrets management tools organizations use to build and deploy modern applications at scale, like Hashicorp Vault, CyberArk Enterprise Password Vault, AWS Secrets Manager, and Microsoft Azure Key Vault, ensuring not just safe distribution of secrets but also detection and prevention of unsafe usage with robust compliance features.

Host Auditing Capabilities

Twistlock provides high-fidelity audit details for sensitive operations across all your hosts in real time within a single dashboard, including sudo, sshd, and Docker API access.

File Integrity Monitoring

Built-in file integrity monitoring enables you to meet compliance objectives by watching for specific kinds of access to specific files and paths. Get alerted to changes to config files, read access to customer data, or any other file access important to your organization.

Log File Inspection

Twistlock can ingest security log files from any application or service, including sshd, sudo, and nginx, parse them for interesting events, and push alerts into your existing security workflows. Write precise regexes to process logs at scale from across all your hosts in all your clouds or choose from our built in templates.

Enterprise-Grade IAM Integrations

Twistlock provides the broadest enterprise identity support, integrating with Active Directory, OpenLDAP, Ping, Okta, Shibboleth, Azure AD, and G Suite, allowing you to implement central credential management in the Twistlock Platform. Define accounts and IAM roles to integrate with your cloud providers in one place and reuse them across the product. Fully pluggable cryptography allows you to bring your own certificates, not just for TLS, but also supporting smart card authentication to Console and the Docker socket.

RBAC and Least Privileged

Twistlock ships with 7 separate roles to provide least privilege access to your devops and security teams. Use Assigned Collections to precisely control what data teams can view or use built-in multi-tenancy to securely isolate entire business units or geographies within the same Console.

“Adding security to a container based implementation of DevOps is essential for vulnerability management, audit logging and permission management to realize economic benefit in software security.”

Jim Routh CISO, Aetna
This guide breaks down the PCI DSS requirements section by section and provides clear instructions on how to design and operate a compliant containerized environment.
The Guide to PCI Compliance for Containers
DOWNLOAD
DOWNLOAD COMPLIANCE GUIDE