Control outbound network access per executable
Traditional firewalls enforce rules at the host or container boundary, while Bomfather ties network rules to the executable.
This makes sure that only the processes you trust can reach sensitive destinations like your KMS or signing API. Bomfather protects destinations so only mapped executables can reach them and blocks all access to destinations that aren't explicitly stated. Together, these prevent data exfiltration and keep egress to a minimum.
For example, if you pull in a dependency that has a vulnerability, how can you make sure that a malicious actor can't steal your secrets? To steal your secrets, the malicious actor needs to be able to extract them to somewhere they can read your secrets (an external IP), so if you restrict which IPs any executable on your machine can access, the malicious process can't exfiltrate the secrets.