Aptible logoUse CasesCustomersLog In
Menu
Aptible Deploy Features

Host-based Intrusion Detection
(HIDS) and Incident Response

Your cloud infrastructure is protected at the host level with both intrusion detection monitoring and incident response. The Aptible Security Team investigates, responds to, and resolves any security incidents that are discovered via the HIDS.

Start with Deploy

How it works

01

Event Collection & Monitoring

Security events are collected using OSSEC, a leading open source intrusion detection system. The Aptible Security Team monitors these events.

02

Investigation & Response Process

The Aptible Security Team actively reviews each security event using our ISO 27001 certified security review process. The Security Team classifies each as either legitimate or indicative of potential attack.

03

Aptible Security Team Resolution

The Aptible Security Team immediately resolves any underlying issues related to detected anomalous activity on your behalf and notifies you of the actions taken.

Sample HIDS Compliance Report

Provide your customers and auditors with evidence that your host-based intrusion detection system is monitoring activity and potential threats are resolved.

Download Sample Report

The Aptible Security Team Monitors, Investigates, Responds to, and Resolves Security Events

Your host-based intrusion detection system (HIDS) is an important tool to manage your stack's security.

Continuous Host Activity Monitoring

Your infrastructure generates a constant stream of events relevant to the security of your data. Aptible Deploy HIDS is installed on each host that runs your containers by default and will detect potential intrusions and other anomalous activities.

Immediate Security Team Response

The Aptible Security Team monitors and investigates each event to determine the legitimacy of all activity. Crucially, the Aptible Security Team immediately responds to and resolves any issues that are discovered through investigation of anomalous activity and will notify you of any remediation steps taken.

HIDS Compliance Report

You can optionally subscribe to the Deploy HIDS Compliance Report to provide your customers and auditors evidence that you are using HIDS to monitor, analyze, and remediate security events.

Events Collected
  • File integrity change
  • Rootkit check
  • Malware scanning
  • System integrity check
  • Privilege escalation
  • SSH login
  • User or group modification

Beyond

Arrow

SOC 2

ISO 27001

HIPAA

GDPR

Audit-Ready

Start your security management journey now.

Get Started