Get Puppet Enterprise First 10 nodes are free!
Try it now
Request a demo
Automate IT and infrastructure, manage complex workflows, and mitigate risk at scale.
Try the full-featured Puppet Enterprise for free on 10 nodes.
Puppet Comply Find and prevent compliance failures
Compliance EnforcementRemediate to stay in compliance
Continuous Delivery for Puppet Enterprise Build, test, and deploy infrastructure as code faster and easier
Content & Modules Pre-built scripts to automate common tasks
CentOS EOL Here’s how to secure your CentOS infrastructure – even after EOL.
Find thousands of component modules built by the community and guidance on using them in your own infrastructure.
Visit Puppet Forge >>
Open Source PuppetPerfect for individuals and small infrastructure
BoltAutomate tasks in orchestration workflows
See all open source projects >>
Contribute to open source projects >>
Download the free datasheet to find out how Puppet gets you closer to Essential Eight compliance.
The Australian Cyber Security Centre Essential Eight (or ACSC Essential 8) is a framework of eight IT security risk mitigation strategies required by the Australian government.
The average cost of an Australian data breach is ~$4.3 million AUD ($2.9 million USD). That makes it the 11th most costly country in the world for cyberattacks.1
As of 2022, all Australian non-corporate Commonwealth entities (NCCEs) must adhere to all eight security controls outlined in the ACSC Essential 8. Failure to prove compliance with the Essential Eight can leave organisations on the hook financially and legally.
Puppet’s compliance use cases include configuration management, app control, patching, app hardening, restricting privileges, backups, and more – all critical considerations of the ACSC Essential 8.
1Source: IBM, "Cost of a data breach 2022"