Skip to main content

Overview

Welcome to the Cyscale documentation. Here you can find out more about what the Cyscale Cloud Platform is, how it works, and when to use it.

To start using Cyscale, start your Free Trial, or please contact us at [email protected].

Cyscale Cloud Platform

Cyscale Cloud Platform (Cyscale) helps organizations build and run secure and compliant cloud environments.

As a CNAPP (Cloud-Native Application Protection Platform) recognized by Gartner, Cyscale provides comprehensive cloud security capabilities including CSPM, CIEM, KSPM, and DSPM. While these classifications are helpful for security professionals, we prefer to explain our core capabilities in practical terms:

Key Capabilities

  • Unified Cloud Asset Inventory

    Connect your cloud accounts and identity providers through secure, provider-specific mechanisms. Cyscale discovers your infrastructure through native APIs, creating a comprehensive snapshot in a unified format. This enables deep analysis across multiple cloud providers, accounts, and regions.

  • Security Posture Assessment

    Once connected, Cyscale continuously evaluates your infrastructure against CIS benchmarks and Well-Architected Frameworks. We identify misconfigurations and vulnerabilities in real-time, helping you build more secure and robust systems. Results are presented as actionable alerts during each asset synchronization.

  • Cloud Identity Management

    Monitor and secure identity relationships across your cloud environments. Detect overprivileged accounts, analyze permission boundaries, and enforce least-privilege access principles through automated assessment of roles, policies, and effective permissions.

  • Kubernetes Security

    Protect your container workloads with dedicated Kubernetes security posture management (KSPM). Identify misconfigurations, validate security best practices, and ensure compliance across your Kubernetes clusters, pods, and containers.

  • Data Security

    Discover, classify, and protect sensitive data across cloud storage services. Monitor data access patterns, detect exposure risks, and ensure compliance with data protection requirements through continuous data security posture management (DSPM).

  • Runtime Protection

    Detect and respond to threats in real-time across your cloud workloads. Monitor container runtime behavior, identify anomalies, and prevent attacks through automated security policies and incident response workflows.

  • Compliance Management

    Our security controls map directly to major standards like ISO 27001, PCI DSS, NIST 800-53, SOC 2, and HIPAA. While these frameworks specify what to implement (like encryption and MFA), Cyscale helps you define how to implement them across different cloud providers and services. Our policy editor lets you precisely map your organization's compliance requirements to actual cloud configurations.

Security Knowledge Graph

The Security Knowledge Graph provides context-aware security analysis that goes beyond simple configuration checks. For example:

  • A public-facing RDS instance represents an immediate risk
  • A permissive security group only poses risk when attached to active resources
  • Many vulnerabilities have reduced impact when assets aren't internet-accessible

This context-aware approach helps you:

  • Understand the relationships between cloud resources
  • Identify actual exploitation paths
  • Prioritize remediation based on real risk
  • Focus on addressing critical issues first