2025 Cloud-Native Security and Usage Report: How are enterprises advancing their security?  READ NOW Customers rate Sysdig top CNAPP in Customers' Choice category within Gartner® VOC report  LEARN MORE
Sysdig logo Sysdig Home
Sysdig logo
  • Platform
    • Back
    • Platform
    • Platform
      • Sysdig Secure
        CNAPP powered by runtime insights
      • Environments
      • Integrations
      • Sysdig Monitor
    • Powered By
      • Falco
        The core engine providing runtime insights to the Sysdig platform
    • hidden header
      • Sysdig Sage™ GenAI
        AI cloud security analyst with multi-step reasoning
    • SysDig 555 logo555 Benchmark
      Detect and respond to cloud attacks faster than attackers can complete them
  • Solutions
    • Back
    • Solutions
    • Real-time Cloud Security
      • Cloud-Native Application Protection Platform
        Unified cloud security to protect your cloud, containers, and workloads
      • AI Workload Security
        Detect, prioritize, and remediate active AI risk
      • Cloud Detection & Response
        Detect, investigate, and respond to threats at cloud speed
    • From Prevention to Detection & Response
      • Cloud Workload Protection
      • Vulnerability Management
      • checklist icon
        Cloud Security Posture Management
      • Cloud Identity & Entitlement Management
    • hidden
      • Container & Kubernetes Security
      • Server Threat Detection & Response
      • Infrastructure as Code Security
    • Falco logoCloud Security Requires Runtime Insights
      Real-time visibility for detection and response and rich context to prioritize what matters most
  • Company
    • Back
    • Company
    • Why Sysdig
      • Our Customers
        Hear how our customers secure and accelerate innovation in the cloud
      • Runtime Insights
        Learn how runtime insights powers real-time cloud security
      • Threat Research Team
        Get the latest threat research and security findings
    • About Sysdig
      • Who We Are
      • Leadership Team
      • Newsroom
    • Compare Sysdig
      • Aqua
      • Crowdstrike
      • Lacework
      • Orca
      • Prisma Cloud
      • SentinelOne
      • Wiz
    • Headshot of Dan Holden, VP of Cybersecurity at BigCommerceCustomer Spotlight
      BigCommerce achieves real-time cloud security
  • Open Source
    • Back
    • Open Source
    • OSS
      • Sysdig & OSS
        The future of security is open
    • Projects
      • Falco
        Detect threats in real time
      • Falco Feeds by Sysdig
        Enterprise detection rules for Falco users
      • Stratoshark
        Analyze, troubleshoot, and secure cloud environments
    • hidden
      • Open Policy Agent
        Unify policy enforcement for cloud-native environments
      • Prometheus
        Monitor cloud-native applications and Kubernetes
    • Headshot of Loris Degioanni - CTO and founder of SysdigWhy Open Source Matters
      Falco’s journey to CNCF graduation
  • Resources
    • Back
    • Resources
    • Learn
      • Blog
        Get the latest news and insights from cloud security experts
      • Learn Cloud Native
        Learn cloud and container security fundamentals
      • Content Library
        Explore cloud and container security content
    • Engage
      • Webinars & Workshops
      • Events
      • Contact Us
    • Get Support
      • Contact Support
      • Sysdig Status
      • Docs
    • Sysdig Threat Research thumbnailSysdig Threat Research
      Security research focused on the latest cloud-native security threats, vulnerabilities, and attack patterns
  • Search
    • Back
    • Best Match
      View all search results
  • Languages
    • Back
    • Language
    • Language Header – Hidden
      • Deutsch
      • English
      • Español
      • Français
      • Italiano
      • 日本語
  • Log In
    • Back
    • Log In
    • Monitor
      • US-East
      • US-West
      • EU-Central
      • AWS-AP-Sydney
      • AWS-AP-South
      • GCP-US-West
    • Secure
      • US-East
      • US-West
      • EU-Central
      • AWS-AP-Sydney
      • AWS-AP-South
      • GCP-US-West
    • Log In – 3rd Column Header – HIdden
      • Support
  • Get Demo
  • SysDig 555 logo555 Benchmark
    Detect and respond to cloud attacks faster than attackers can complete them
  1. Blog
  2. Vicente Herrera García

Vicente Herrera García

Sysdig Features, Cloud Security

Cloud Infrastructure Entitlements Management (CIEM) with Sysdig Secure

Compliance, Sysdig Features

NIST 800-53 compliance for containers and Kubernetes

Blogs by Vicente Herrera García

Filter By:
CIEM with Sysdig Secure
Sysdig Features, Cloud Security

Cloud Infrastructure Entitlements Management (CIEM) with Sysdig Secure

Vicente Herrera García | October 27th, 2021
NIST 800-53 compliance for containers and Kubernetes security
Compliance, Sysdig Features

NIST 800-53 compliance for containers and Kubernetes

Vicente Herrera García | September 22nd, 2021
Blog Deploying Sysdig from the new AWS CloudFormation Public Registry
Cloud Security, Sysdig Features

Deploying Sysdig from the new AWS CloudFormation Public Registry

Vicente Herrera García | June 21st, 2021
Cloud Security, Kubernetes & Container Security, Sysdig Features

Unified threat detection for AWS cloud and containers

Vicente Herrera García | March 30th, 2021
Cloud Security, Compliance, Sysdig Features

AWS CIS: Manage cloud security posture on AWS infrastructure

Vicente Herrera García | March 30th, 2021

Preventing malicious use of Weave Scope

Vicente Herrera García | December 10th, 2020
SOC 2 compliance banner

SOC 2 compliance for containers and Kubernetes security

Vicente Herrera García | October 27th, 2020
image scanning for google cloud build banner

Image scanning for Google Cloud Build

Vicente Herrera García | October 6th, 2020
AWS threat detection using CloudTrail and Sysdig Secure

AWS threat detection using CloudTrail and Sysdig Secure

Vicente Herrera García | September 29th, 2020
Automate Fargate Image Scanning illustration

Automate Fargate image scanning

Vicente Herrera García | September 29th, 2020
Tekton scanning

Securing Tekton pipelines in OpenShift with Sysdig

Vicente Herrera García | April 9th, 2020
Malicious Python libraries jeilyfish and python3-dateutil

Protection From Malicious Python Libraries Jeilyfish and Python3-dateutil

Vicente Herrera García | December 12th, 2019
Back to Blog
  • Products
    • Sysdig Secure
    • Sysdig Monitor
  • Partners
    • Sysdig Partners
    • Partner Signup
    • Partner Locator
    • Integrations
    • Partner Portal
  • Company
    • About Us
    • Leadership
    • Careers
    • Newsroom
    • Contact Us
    • Legal
    • Sitemap
  • Support
    • Support
    • Sysdig Status
    • Documentation
    • Customer Success
  • Social
    • X (Formerly Twitter) logoTwitter
    • Github logoGithub
    • Slack logoSlack
    • YouTube logoYoutube
    • LinkedIn logoLinkedIn

Sysdig logo
  • ® Copyright 2025 Sysdig, Inc.
  • Privacy Policy
  • Privacy Choices
  • Subprocessors
  • Trust Center
  • Change Consent