Your cloud infrastructure is protected at the host level with both intrusion detection monitoring and incident response. The Aptible Security Team investigates, responds to, and resolves any security incidents that are discovered via the HIDS.
Security events are collected using OSSEC, a leading open source intrusion detection system. The Aptible Security Team monitors these events.
The Aptible Security Team actively reviews each security event using our ISO 27001 certified security review process. The Security Team classifies each as either legitimate or indicative of potential attack.
The Aptible Security Team immediately resolves any underlying issues related to detected anomalous activity on your behalf and notifies you of the actions taken.
Provide your customers and auditors with evidence that your host-based intrusion detection system is monitoring activity and potential threats are resolved.Download Sample Report
Your host-based intrusion detection system (HIDS) is an important tool to manage your stack's security.
Your infrastructure generates a constant stream of events relevant to the security of your data. Aptible Deploy HIDS is installed on each host that runs your containers by default and will detect potential intrusions and other anomalous activities.
The Aptible Security Team monitors and investigates each event to determine the legitimacy of all activity. Crucially, the Aptible Security Team immediately responds to and resolves any issues that are discovered through investigation of anomalous activity and will notify you of any remediation steps taken.
You can optionally subscribe to the Deploy HIDS Compliance Report to provide your customers and auditors evidence that you are using HIDS to monitor, analyze, and remediate security events.