ZEST Expands its IaC Tool Support

The rapid adoption of DevOps tools has transformed how organizations deploy and manage cloud infrastructure, enabling developers to spin up cloud resources faster than ever. However, with speed comes risks (e.g. misconfigurations and vulnerabilities introduced at the code stage). Remediating these risks requires close collaboration between security and DevOps teams, but the shared responsibility creates bottlenecks, resulting in significant delays.

While DevOps has vast knowledge of cloud infrastructure and system engineering, they are not security experts, and we can’t expect them to be. Conversely, security teams often lack the technical fluency to provide precise guidance on what exactly to fix and where.

To bridge this gap, security teams require remediation solutions that seamlessly integrate into the tools and workflows developers already use. This is where the concept of Security as Code (SaC) comes in — leveraging the same Infrastructure as Code (IaC) tools that introduced the problem to efficiently remediate it.

Today, we’re excited to announce expanded support for Infrastructure as Code (IaC) tools, now including CloudFormation, Terraform, Pulumi and ARM. This enhancement enables security and DevOps teams to collaborate more efficiently, drastically increasing the speed at which vulnerabilities and other cloud risks are remediated.

The Benefits

Seamless integration into DevOps workflows
DevOps teams use a variety of IaC tools to manage cloud infrastructure. By expanding our IaC support to include the most popular platforms, security teams can seamlessly integrate with DevOps workflows to gain visibility into what DevOps actually manages, where and how, streamlining the remediation process.

Greater context & fix precision
With expanded IaC support, security teams can more accurately pinpoint the root causes of issues down to the exact lines of code, regardless of which tool was used. This provides security and DevOps teams with clear remediation guidance on where exactly the problem needs to be fixed.

Accelerated remediation
The ZEST platform doesn’t stop at identifying problematic code. By leveraging Generative AI, the platform automatically generates replacement code, empowering security and DevOps teams with ready-to-implement fixes, drastically reducing manual effort and time to remediation.

Security as Code (SaC) Explained

Fixing an issue requires understanding how it was introduced—identifying the problematic code and the platform that was used. However, this can be extremely time consuming, and as a result, remediation efforts often involve making quick fixes directly in production, with developers making changes in the cloud console. While this approach may be fast, it increases the risk of human error, unintended overrides, and recurring vulnerabilities.

Security as Code (SaC) takes a different approach, enabling security teams to take advantage of the power and speed of DevOps systems to remediate issues at scale within secure deployment workflows. By integrating security directly into the development process, SaC ensures more precise and efficient remediation, minimizing risks and reducing the potential for future issues.

How it Works

  • Automatically pinpoint root cause: Identify the origin of the issue down to the exact lines of code that introduced the problem.
  • Generate replacement code: Leverage Generative AI to produce ready-to-implement fixes directly within the same IaC tool that introduced the risk.
  • Empower DevOps: Deliver clear, actionable guidance with the necessary context so that DevOps can implement fixes quickly.

The Bigger Picture

Implementing Security as Code (SaC) enables organizations to:

Reduce MTTR: Reduce the gap between risk identification and resolution, enabling security teams to address vulnerabilities way before they are exploited by attackers.

Maximize DevOps efficiency: Faster remediation means DevOps teams can spend more time on strategic initiatives that drive business growth, rather than being bogged down by security tickets.

Minimize operational costs: Eliminate manual remediation efforts and empower security teams to fix open security issues fast, reducing the costs associated with remediation.

Ready to see more?

Looking for a more efficient way to remediate cloud vulnerabilities and other risks? Contact our team to learn how our expanded IaC tool support is helping security and DevOps teams fix issues with greater speed and precision.

Share the Post:

Related Resources

AWS Organizations and Delegated Administrator: Security Pros and Cons

Introduction AWS Organizations is a service that enables centralized governance…

ZEST for Cloud Security Risk Resolution

How ZEST streamlines remediation and mitigation of cloud security risks…

7 RSAC 2025 Cloud Security Sessions You Don’t Want to Miss

Some of the brightest minds in the industry will discuss…

Understanding Preemptive Exposure Management and Why it Matters

Last week, Gartner® released a new emerging technology report on…

ZEST Platform Now Available in AWS Marketplace

We are excited to announce that ZEST Security’s Agentic-AI Risk…

How to go From Zero to a Well-Secured, Managed Cloud Security State

Building an effective cloud security risk management program can seem…

Google’s $32 Billion Wiz Buy Bolsters Its Cloud Security Capabilities, Experts Say

Google Cloud aims to harness Wiz’s expertise and Mandiant’s threat…

Aaron Brown Joins ZEST Security’s Advisory Board

Today we are excited to officially announce that Aaron Brown,…

$32 billion Google-Wiz deal bodes well for cloud security, experts say

Cloud industry leaders such as Snir Ben Shimol, co-founder and…

Building a Cloud Security Program That Actually Works

In this webinar, we discuss essential best practices and milestones…

Code to Cloud and Back: Closing the Remediation Loop

What is Code to Cloud? Everyone is in the cloud,…

The Future of Cloud Security and the Role of AI

With the visibility challenge largely addressed, what’s next? How will…

ZEST Security’s Cloud Risk Exposure Impact Report Reveals 62% of Incidents are Related to Risks Known to the Organization

ZEST Security, provider of an Agentic-AI Cloud Risk Resolution platform,…

4 Reasons Cloud Security Risk Management is Adopting an Incident Response Mentality

The high volume of alerts, combined with tedious and manual…

Stat of the week

Cybersecurity professionals have to always have one eye on the…

Cloud security report shows growing remediation gap amid increased risk awareness

Attackers now exploit vulnerabilities within an average of five days,…

Beyond CVSS: Why EPSS and KEV Are Game-Changers for Prioritizing Vulnerabilities

Publicly disclosed computer vulnerabilities are organized into a globally recognized…

Cloud risks rise due to slow remediation, costs USD $2m+

The study reports that organisations face an annual remediation cost…

Resilient Cyber Newsletter #33

ZEST’s Cloud Risk Exposure Impact Report provided a handful of…

Over 60 percent of enterprise cybersecurity incidents relate to known risks

“There is a direct correlation between delays in remediation and…

Survey Sees Organizations Being Overwhelmed by Remediation Challenges

Conducted by ZEST Security, the survey finds half of respondents…

The Cloud Security Paradox: Why We Keep Losing To Known Risks

Organizations have more visibility into cloud cybersecurity risks today than…

7 cloud security startups not named Wiz

Today, remediation processes today are extremely manual, time consuming and…

ZEST Security’s Cloud Risk Exposure Impact Report Reveals 62% of Incidents are Related to Risks Known to the Organization

Report uncovers direct link between remediation toil and rise in…

Cloud Risk Exposure Impact Report 2025

Industry-first report examining the relationship between remediation delays and…

How to Build an Efficient Risk Resolution Plan

From Visibility to Action  While security teams have the visibility…

ZEST Security’s Cloud Security Predictions for 2025

2025 is here and it’s time to talk predictions. Here…

The Role of AI, Consolidation, and More on Cloud Security

Today, CNAPP is a billion-dollar industry, providing security teams with…

6 Core Capabilities for Cloud Risk Resolution

This guide outlines the core capabilities to build an efficient…

A Conversation with Vladi Sandler: A World Beyond CNAPP

Discussing the journey that led to the widespread adoption of…

Resolving your cloud risks with ZEST!