Policy Library

Zilla Secure provides several pre-configured policies that help any organization quickly identify areas of misconfiguration that should be addressed. 

Zilla provides several AWS focused policies to watch for over-privileged access and common misconfigurations that put an organization at risk. These AWS specific policies align with the CIS AWS Foundations Benchmark controls, AWS Foundational Security Best Practices controls, and PCI DSS controls for S3 resources.

Zilla provides a set of preconfigured, prepackaged policies out of the box that address the most high-risk areas of identity and access threats across multiple categories:

 

  • Third Party Access - Identification of third-party accounts that are outside of your organization who have access. 

  • Orphan Accounts - Identification of active accounts that have access but are not associated with a user identity. 

  • MFA - Identification of MFA misconfigurations that should be investigated to ensure proper authentication methods are configured and being used. 

  • Unused Access - Identification of access credentials / keys that have not been used for a length of time and should be disabled / removed from the system to prevent unauthorized access. 

  • Terminations - Identification of users that have been terminated and still have access that should be removed to one or more applications.

  • Security Configuration - Identification of serious misconfigurations that could put an enterprise at risk. 

  • Service Account - Identification of special application accounts that may be misconfigured and pose a potential security risk.

  • Job Appropriate Access - Minimize risk by identifying access to systems, applications, and data that users have access to based on their job duties.

  • New Access - Identification of new access to systems and applications to verify the user's identity and determine whether the access is necessary.

  • Privileged Access - Identification of privileged access across systems, applications, and data. Identify who has access and if that access is appropriate.

  • Governance - Misconfigurations that require attention or application ownership that require updating. 

  • Segregation of Duties - Regulate users to not have access to two or more phases of a process, as this could lead to errors or fraudulent activity.

 

Policies are located in a sub-menu under the Security menu on left sidebar in the Zilla application.

image-20240729-055534.png