How does CloudHook work?

Edgescan CloudHook is a pivotal integration designed to automate the onboarding of locations from various cloud environments directly into the Edgescan platform.

Version Number: v1.0.1

Published Date: 13 May 2024

____________________________________________________________________________

By feeding location data, including IPs and hostnames, into the platform, CloudHook leverages Edgescan's External Attack Surface Management (EASM) and vulnerability management capabilities to illuminate and eliminate cloud risks. This ensures that as your cloud endpoints evolve, Edgescan maintains pace, providing full visibility and eliminating blind spots in your security monitoring and testing framework.

How CloudHook Works

CloudHook operates by using credentials to access your cloud environment, systematically retrieving all public-facing IPs and hostnames hourly. New locations are onboarded automatically, enhancing the platform's ability to monitor and scan assets efficiently. This includes both dedicated and grouped assets, ensuring comprehensive coverage.

 If a location is no longer present in the cloud environment, its scanning is halted, and the location is removed from Edgescan, keeping the inventory current and relevant.

Key Features and Benefits

  • Automated Syncing: CloudHook reduces manual processes by automating the task of syncing cloud environments, offloading outdated locations and dynamically allocated addresses.

  • Complete Visibility: Gain an extensive view of your public cloud assets, enhancing your ability to prevent exposures and monitor security postures in a unified platform.

  • Dynamic Testing: Automate testing on dynamically allocated addresses, ensuring new services are immediately included in security assessments without manual intervention.

EASM and Vulnerability Management

Edgescan's EASM solution offers real-time evaluation of assets as they are deployed, changed, or decommissioned, identifying security blind spots and mapping all assets within the cloud. This continuous visibility is critical in a landscape where cloud surfaces are ephemeral and constantly changing.

The vulnerability management component provides full-stack management, assessing a wide range of technologies and frameworks for vulnerabilities, validated to eliminate false positives and improve operational efficiency.

Integration Workflow

CloudHook's integration workflow simplifies the process of retrieving locations, checking their presence on Edgescan, activating necessary locations, and ensuring accurate licensing and scanning configurations. This streamlined workflow gives time back to SecOps and Dev teams by automating cloud syncing tasks and eliminating manual tasks in traditional inventory and asset management workflows.

integration workflow

Supported Cloud Environments

CloudHook supports a range of popular cloud environments, including:

  • AWS (Amazon Web Services): Integration includes EC2 Elastic IP addresses and Route53 hostnames.

  • GCP (Google Cloud Platform): Covers External IP addresses and Cloud DNS hostnames.

  • Azure: Involves Public IP addresses and DNS zone hostnames.

This integration simplifies the process of monitoring cloud-based assets, ensuring your security posture is both current and comprehensive without the need for manual updates or checks.