Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

UK and Ukraine officially sign civil space cooperation

How Ceros gives security teams visibility and control over their code

DarkSword iOS exploit kit uses 6 flaws, 3 zero-days to take over entire device

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » How Ceros gives security teams visibility and control over their code
Identity

How Ceros gives security teams visibility and control over their code

By March 19, 2026No Comments10 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

claude code

Security teams have spent years building identity and access controls for human users and service accounts. However, a new category of actors has quietly infiltrated most enterprise environments and operates completely outside of their control.

Anthropic’s AI coding agent, Claude Code, is now running at scale across engineering organizations. It reads files, executes shell commands, calls external APIs, and connects to third-party integrations called MCP servers. All of this runs autonomously on the developer’s local machine, with the full privileges of the developer who launched it, before any network-layer security tools are aware of it. It leaves behind no audit trail that your existing security infrastructure was built to capture.

This tutorial introduces Ceros, an AI trust layer built by Beyond Identity. Ceros resides directly on developers’ machines with Claude Code, providing real-time visibility, runtime policy enforcement, and an encrypted audit trail of every action an agent performs.

Problem: Claude code operates outside of existing security controls

Before we discuss the product, it will help you understand why existing tools cannot address this problem.

Most enterprise security tools are located at the network edge or API gateway. These tools look at your traffic after it leaves your machine. By the time the SIEM ingests an event or the network monitor flags anomalous traffic, the Claude code is already working. That is, the file has already been read, the shell command has already been executed, and the data has already been moved.

Claude Code’s behavioral profile greatly exacerbates this problem. It lives off the land, using tools and permissions that already exist on the developer’s machine, rather than bringing in anything of its own. Communicate through external model calls that look like normal traffic. It performs a complex series of actions that are not explicitly programmed by humans. It also runs with fully inherited privileges from the invoker, including access to credentials, operational systems, and any sensitive data that the developer happens to have on his or her machine.

The result is a gap that network layer tools cannot structurally fill. This means that all the processing that the Claude code does on your local machine happens before the request leaves the device. That is where Ceros operates.

Introduction: 2 commands, 30 seconds

Ceros is designed so that installation does not interrupt a developer’s workflow. Setup requires two commands.

curl -fsSL https://agent.beyondidentity.com/install.sh | bash selos claude

The first command installs the CLI. The second launches Claude Code through Ceros. A browser window will open, ask you to enter your email address, and send you a six-digit verification code. Once you enter the code, Claude Code will launch and work exactly as before. From a developer’s perspective, nothing has changed.

When rolling out across an organization, administrators can configure Ceros to automatically prompt developers to register when they launch Claude Code. Security becomes invisible to developers. This is the only way to really implement security at scale.

Once registered, Ceros captures the complete device context including OS, kernel version, disk encryption status, secure boot state, and endpoint protection status, all within 250 milliseconds, before Claude Code generates a single token. It uses binary hashes of all executables in the chain to capture the complete process ancestry of how Claude code was called. It then connects the session to a verified human identity through Beyond Identity’s platform, signed with a hardware-bound cryptographic key.

Console: See what the Claude code is actually doing

After registering a device and running Claude Code normally for a few days, you go to the Ceros management console and see something most security teams have never seen before. This is a complete record of what Claude Code was actually doing across the environment.

[会話]The view shows all sessions between developers and Claude Code across all registered devices, listed by user, device, and timestamp. Click on a conversation to see the full interaction between developer and agent. But between the prompt and the response, something else appears: a tool invocation.

When a developer asks Claude Code a simple question like “What files are in my directory?” LLM simply doesn’t know the answer. This tells the agent to run a tool (in this case bash ls -la) on your local machine. That shell command runs on the developer’s device using the developer’s permissions. One casual question triggers a real run on a real machine.

[会話]The view shows all calls to these tools per session. For most security teams, this is the first time they’ve seen this data.

[ツール]The view has two tabs.[定義]The tab displays all the tools available to Claude Code across registered environments, including built-in tools such as Bash, ReadFile, WriteFile, Edit, SearchWeb, and all MCP servers that the developer has connected to the agent. Each entry contains the complete schema of the tool, the instructions given to the LLM about what the tool does and how to invoke it.

[呼び出し]The tab shows what was actually done. Not just what exists, but what was called and what was returned with what arguments. Security teams can drill down into individual tool calls to see the exact commands executed, arguments passed, and the complete output returned.

The MCP server view is where many security teams have their most important moments of discovery. The MCP server is how Claude Code connects to external tools and services such as databases, Slack, email, internal APIs, and operational infrastructure. Developers add these casually, thinking more about productivity than security. Each is a data access path that no one considers.

The Ceros dashboard shows all MCP servers connected to Claude Code across all registered devices, when they first appear, on which devices they appear, and whether they are authorized. In most organizations, there is a wide gap between what security teams assume is connected and what is actually connected.

Policies: Apply controls to your code at runtime

Visibility without governance exposes risks, but does not prevent them. The policy section is where Ceros moves from monitoring to enforcement and where the compliance story takes shape.

Policies in Ceros are evaluated at runtime before any actions are taken. This distinction is important for compliance. Controls operate at the moment of action and are not reconstructed after the fact.

The MCP server allow list is the first and most impactful policy that most organizations create. Administrators define a list of approved MCP servers and set defaults to block all others. From then on, any instances of Claude code that attempt to connect to an unauthorized MCP server will be blocked before the connection is established, and the attempt will be logged.

Tool-level policies allow administrators to control which tools Claude Code can call and under what conditions. Policies can completely block Bash tools for teams that do not require shell access from agents. You can allow files in your project directory to be read while blocking reads in sensitive paths such as ~/.ssh/ and /etc/. The policy engine evaluates not only which tool is being called, but also what arguments are being passed. This is the difference between useful policy and policy theater.

Device posture requirements gate Claude code sessions based on the security state of the machine. Policies can require disk encryption to be enabled and endpoint protection to be in place before a session is allowed to start. Ceros continually re-evaluates the state of your device throughout the session, not just at login. If endpoint protection is disabled while the Claude code is active, Ceros will recognize this and act on policy.

Activity log: auditable evidence

The activity log is where Cero relates directly to compliance teams. Every entry is more than just a record. This is a forensic snapshot of the environment at the exact moment Claude Code was called.

A single log entry includes the complete security posture of the device at that point in time, the complete process ancestor of all processes in the chain that called the Claude code, the binary signatures of all executables within that ancestor, the OS-level user ID associated with the verified human, and all actions the Claude code took during the session.

This is important for compliance, as auditors increasingly demand proof that logs are immutable. Standard log files that can be edited by administrators do not meet this requirement. Ceros signs every entry using a hardware-bound encryption key before it leaves the machine. Logs cannot be modified after the fact.

For frameworks that require tamper-proof audit records, such as SOC 2’s CC8.1, FedRAMP’s AU-9, HIPAA’s audit control requirements, and PCI-DSS v4.0’s Requirement 10, this is a specific evidence artifact that satisfies the controls. When auditors ask for evidence of AI agent monitoring and access control, the answer is an export from the Ceros dashboard that covers the entire audit period, is cryptographically signed, and includes user attributes and device context for each entry.

Managed MCP Deployment: Standardize Claude Code’s Tools Across Your Organization

For organizations that want to standardize the tools available in Claude Code in addition to blocking unauthorized tools, Ceros offers managed MCP deployment from the admin console.

Administrators can push authorized MCP servers to all developer code instances from a single interface without requiring any developer configuration. The MCP server will automatically appear in the developer’s agent the next time it starts.

Combined with the MCP server allow list, it creates a complete governance model. Administrators define what is required, what is allowed, and what is blocked. Developers work frictionlessly within that confines.

Dashboard: Agentic AI risk posture across your organization

What’s coming is a dashboard that provides a single view of the AI ​​risk landscape across registered organizations. While the session-level view shows what a single developer’s agents have done, the dashboard shows what’s happening across the fleet: how many devices are provisioned, registered, and actively running Claude Code. Adoption gaps also automatically flag when agents are shown to be running outside of the Ceros registration path and control. Sign up to receive a notification when your dashboard ships.

conclusion

Claude code creates security gaps not at the network edge. It resides on the developer’s machine and the agent runs before existing security tools know about it. Ceros bridges that gap by staying where agents are, capturing everything before they run, and producing cryptographically signed evidence that security and compliance teams can act on.

For security teams whose organizations are introducing cloud code and starting to consider what it means for their audit posture and controls, the starting point is visibility. You can’t manage what you can’t see. Until now, there was no tool that could show you what Claude Code was actually doing.

Ceros is available now and free to get started. Security teams can register a device and see its crawl code activity for the first time on beyondidentity.ai.

Built by Beyond Identity, Ceros is SOC 2 / FedRAMP compliant and can be deployed as cloud SaaS, self-hosted, or fully air-gapped on-premises.

Was this article interesting? This article is a contribution from one of our valued partners. Follow us on Google News, Twitter, and LinkedIn to read more exclusive content from us.

Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleDarkSword iOS exploit kit uses 6 flaws, 3 zero-days to take over entire device
Next Article UK and Ukraine officially sign civil space cooperation

Related Posts

DarkSword iOS exploit kit uses 6 flaws, 3 zero-days to take over entire device

March 19, 2026

Warning of CISA, Zimbra, SharePoint flaw exploitation. Cisco’s zero-day hit in ransomware attacks

March 19, 2026

OFAC sanctions North Korean IT worker network for funding weapons of mass destruction program through fake remote jobs

March 18, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

UK and Ukraine officially sign civil space cooperation

How Ceros gives security teams visibility and control over their code

DarkSword iOS exploit kit uses 6 flaws, 3 zero-days to take over entire device

Muon detector network for monitoring space and terrestrial weather

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.