Announcing Cloud Integrations: The Next Big Leap in Attack Surface Management

Today we are thrilled to announce new cloud integrations in Hardenize. This new capability provides complete visibility into assets in AWS, Google Cloud and Azure, so security teams have a more holistic view of the entire attack surface.

When we first acquired Hardenize, we knew the impact of the best-in-class asset discovery across all public-facing services from email to web and nameservers was a game changer.  The new cloud integration capabilities bring us one step closer to delivering comprehensive visibility of all enterprise assets.

The Need for Cloud Asset Discovery and Monitoring

According to Gartner, as of 2022, less than 1% of companies have more than 95% visibility of all their assets. The inability to visualize and manage cloud assets in particular is a huge contributor to this problem. The assets are difficult to inventory (especially for organizations that leverage a multi-cloud strategy), are often ephemeral, the attack surface is expansive, and cloud assets aren’t always discoverable through typical internet-facing asset monitoring methods. 

This leaves security teams unable to understand, manage, and protect the cloud attack surface. Teams can try to go into individual cloud accounts to find assets manually, but identifying new assets, comparing changes over time, and ensuring that all assets are protected is nearly impossible for security teams that are universally understaffed. 

If that weren’t enough, security leaders are now facing added pressure from their boards for comprehensive attack surface management (ASM) plans. 61% of organizations expect their boards to request an ASM plan this year. 

According to Red Sift Chief Scientist Ivan Ristić, “These plans have to account for the complete attack surface, which must include a holistic, up-to-date view of cloud assets, resources, and their risk profile.”

6x Visibility with the New Cloud Integration

The new cloud integration from Red Sift gives organizations unmatched visibility into and across AWS, Google Cloud Platform and Azure environments.

When certain types of cloud assets (like load balancers, storage, databases and others) are created, the hostname or IP address (or both) isn’t discoverable from anywhere other than the customer’s own cloud account. Typical discovery methods will not find these assets and a large portion of the attack surface will remain unseen and unprotected. 

The new cloud integration solves this problem. Beta customers that used the new cloud integration discovered 6 times the assets compared to traditional ASM methods.

How It Works

To provide users with unmatched visibility of cloud assets, the new integration will: 

  1. In every connected cloud account, check for new assets on a daily basis. To do so, the integration will look for domain names, DNS zones, and cloud resources including compute instances, load balancers, storage, and more.
  2. Any new assets are automatically imported into Hardenize to begin monitoring the configuration of the asset. 
  3. Provide detailed information to help understand where the assets have originated from and what type of resource the asset is. 
  4. Automatically remove any resources from Hardenize that no longer exist in your cloud account.

To see the new cloud integration in action, watch the walkthrough below.

Shared Intelligence Across Red Sift Apps

Cloud Security Posture Management (CSPM) tools are growing in popularity for how they solve visibility issues for infrastructure and security teams. While that is a huge step forward, they only solve a piece of the visibility puzzle. 

What makes this cloud integration different from CSPM tools is that cloud assets are surfaced alongside the internet-facing asset inventory to give you a unified view of your attack surface. From there, discovered domains are shared with the Red Sift platform to make sure you are prepared for all potential risks and threats that could impact your business. 

Cloud attack surface management is just one component of external attack surface management and cannot be siloed.

Get Started Now

If you have a Business or Enterprise plan, then Cloud Integrations is available now. Visit the Docs section in Hardenize to get started.

If you are on a Starter or Teams plan and would like to add Cloud Integrations to your plan, get in touch with your Customer Success Manager. 

If you’re not a customer, find out more here


Billy McDiarmid

7 Sep. 2023




Recent Posts


Red Sift Recognized on Deloitte’s EMEA Fast 500™ List

Francesca Rünger-Field

We’re thrilled to share that Red Sift has been included in Deloitte’s 2023 EMEA Fast 500 list. This recognition stems from 389% revenue growth over three years, $54 million in Series B funding, acquiring ASM innovator Hardenize, and introducing the Red Sift Pulse Platform. Read the press release here. About the award The Deloitte Technology Fast…

Read more
Brand Protection

The vital role of cybersecurity for Nonprofits: A deep dive 

Sean Costigan

Save the Children, a beacon of hope and change, has been dedicated to improving the lives of children for over a century. Founded in London, it now has a presence in 29 nations, employing 844 staff members in the UK alone and engaging over 3600 formal volunteers. As charities and nonprofits like Save the…

Read more

Red Sift brings DMARC data to the SOC with new Cisco XDR…

Rebecca Warren

Today, we’re thrilled to announce that we’re extending our partnership by joining the Cisco Security Technical Alliance and integrating Red Sift OnDMARC with Cisco XDR. This integration builds on the Domain Protection partnership we announced in November 2023 to bring visibility of business email compromise into the SOC (security operations center). At release, Red…

Read more

Preventing certificate related violations in cybersecurity frameworks:  A guide to certificate monitoring…

Rebecca Warren

TLS is one of the most widely adopted security protocols in the world allowing for unprecedented levels of commerce across the internet.  At the core of the TLS protocol is TLS certificates. Organizations must deploy TLS certificates and corresponding private keys to their systems to provide them with unique identities that can be reliably…

Read more