Overview
Welcome to the Byrsa documentation. Here you can find out more about what the Byrsa Cloud Security Platform is, how it works, and when to use it.
To start using Byrsa, contact us at sales@byrsa.io .
Byrsa Cloud Security Platform
Byrsa is a cloud security platform that helps organizations build and run secure, compliant AWS environments. Byrsa connects to your AWS account(s), continuously assesses your infrastructure, and surfaces actionable findings — so your security team can focus on fixing real issues instead of manually reviewing configurations.
Key Capabilities
-
Cloud Asset Inventory
Byrsa discovers your AWS infrastructure through native APIs, building a comprehensive, always-up-to-date inventory across all your accounts and regions. You can browse resources by type, region, or account, and inspect the full configuration of any resource from a single interface.
-
Security Posture Assessment (CSPM)
Byrsa continuously evaluates your infrastructure against security best practices and industry benchmarks, identifying misconfigurations across your AWS resources. Every detected issue is surfaced as a vulnerability with a severity rating (Critical, High, Medium, Low), a description, an impact statement, and a remediation recommendation.
-
Runtime Protection
Byrsa integrates with Amazon Inspector to surface vulnerabilities detected in your running workloads — EC2 instances, Lambda functions, and ECR images. The Runtime Protection page shows your monitored workloads alongside individual findings, each with CVE ID, CVSS score, affected package, and remediation guidance.
-
Compliance Management
Byrsa maps your AWS security posture to major compliance frameworks including CIS AWS Foundations, ISO 27001, SOC 2, PCI-DSS, HIPAA, and NIST 800-53. The Compliance page gives you a real-time view of how your infrastructure aligns to each standard.
-
Attack Paths
Visualize how an attacker could move laterally through your cloud infrastructure by chaining together misconfigurations and overprivileged identities. The Attack Paths page helps you understand the practical exploitability of your environment.
-
Tasks Management
Turn security findings into trackable work items. Create tasks directly from vulnerabilities, assign priorities and statuses, and manage your remediation backlog using a list or kanban board. Tasks optionally sync with Jira.
-
Byrsa AI (AI Copilot)
Ask natural-language questions about your cloud security posture. Byrsa AI has access to your live data — vulnerabilities, findings, compliance status — and can help you understand your risks, prioritize remediation, and get tailored guidance. Available from the Chats page.
-
Reports
Generate PDF and PowerPoint security reports summarizing your current posture, compliance status, and key findings — ready to share with stakeholders or auditors.