PurpleRidge, an AI-powered cyber defence platform, has launched an Automated AWS Account Audit, aimed at exposing how isolated cloud misconfigurations can be chained into full compromise paths.
The company said, in an announcement, that 'RidgeBot's' audit moves beyond basic checklists to identify "Combined Risk Stories" that link separate weaknesses into attack paths.
Such audits highlight credential exposure, public S3 buckets, RDS snapshots and KMS keys with overly broad access, and maps step-by-step privilege escalation chains from guest access to cloud admin, it said.
"AWS secures the infrastructure, but the user is responsible for the security within it," commented Lydia Zhang, Ridge Security president and co-founder.
Related reading
- Google Cloud warns state-backed hackers are targeting Western defence suppliers
- Palo Alto Networks bolsters cyber-sec unit as it completes CyberArk acquisition
- Microsoft warns enterprises to treat AI agents like employees in new security report
"A single 'Public' toggle or a stale access key is all an attacker needs. We provide the validation needed to close those doors."
The firm off a free initial test, followed by a flat $399 fee that unlocks full remediation report and evidence-driven attack paths, the firm added.
The Recap
- PurpleRidge launched an Automated AWS Account Audit offering.
- Free initial test available; full report costs $399.
- Platform maps attack chains and links findings to MITRE.