You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: solutions/security/get-started.md
+38-6Lines changed: 38 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,19 +14,50 @@ products:
14
14
15
15
New to {{elastic-sec}}? Follow the instructions in this topic to get started. Then, review the rest of the Get Started section to learn how to use the UI, review requirements, and discover more about our security features.
16
16
17
-
:::::{{stepper}}
18
-
::::{{step}} Install the Elastic Stack
17
+
::::::{{stepper}}
18
+
:::::{{step}} Choose your deployment type
19
19
20
-
To use {{elastic-sec}}, at minimum, you'll need to install {{es}} and {{kib}}—the core components of the {{stack}}. Elastic provides several self-managed or Elastic-managed installation options. For simplicity and speed, we recommend one of our [{{ecloud}}](/deploy-manage/deploy/elastic-cloud.md) options—either {{ech}} or {{serverless-full}}. However, if you prefer to install Elastic on your own infrastructure, you can deploy a [self-managed cluster](/deploy-manage/deploy/self-managed.md). Check out our [deployment types](/deploy-manage/deploy.md#choosing-your-deployment-type) to learn more.
20
+
Elastic provides several self-managed and Elastic-managed options. For simplicity and speed, we recommend [](./elastic-security-serverless.md), which enables you to run {{elastic-sec}} in a fully managed environment so you don’t have to manage the underlying {{es}} cluster and {{kib}} instances.
21
+
22
+
::::{dropdown} Create an Elastic Security Serverless project
23
+
24
+
There are two options to create serverless projects:
25
+
- If you're a new user, [sign up for a free 14-day trial](https://cloud.elastic.co/serverless-registration). For more information about {{ecloud}} trials, check out [Trial information](/deploy-manage/deploy/elastic-cloud/create-an-organization.md#general-sign-up-trial-what-is-included-in-my-trial).
26
+
- If you're an existing customer, [log in to {{ecloud}}](https://cloud.elastic.co/login) and follow [these instructions](./get-started/create-security-project.md) on how to create a serverless project.
27
+
28
+
:::{note}
29
+
You need the `admin` predefined role or an equivalent custom role to create projects. For more information, refer to [User roles and privileges](https://www.elastic.co/docs/deploy-manage/users-roles/cloud-organization/user-roles).
30
+
:::
31
+
32
+
After you've created your project, you're ready to move on to the next step.
21
33
::::
22
34
35
+
Alternatively, if you prefer a self-managed deployment, you can create a [local development installation](https://www.elastic.co/docs/deploy-manage/deploy/self-managed/local-development-installation-quickstart) in Docker:
36
+
37
+
```sh
38
+
curl -fsSL https://elastic.co/start-local | sh
39
+
```
40
+
41
+
Check out the complete list of [deployment types](/deploy-manage/deploy.md#choosing-your-deployment-type) to learn more.
42
+
43
+
:::::
44
+
23
45
::::{{step}} Ingest your data
24
46
25
47
26
-
After you've deployed {{elastic-sec}}, the next step is to get data into the product before you can search, analyze, or use any visualization tools. The easiest way to get data into {{elastic-sec}} is through one of our [Security integrations](https://www.elastic.co/integrations/data-integrations?solution=security)—pre-packaged collections of assets that allows you to easily collect, store, and visualize any data from any source. You can add an integration directly from the **Get Started** page within the **Ingest your data** section. Choose from one of our recommended integrations, or select another tab to browse by category. Elastic also provides different [ingestion tools](../../manage-data/ingest/tools.md) to meet your infrastructure needs.
48
+
After you've deployed {{elastic-sec}}, the next step is to get data into the product before you can search, analyze, or use any visualization tools. The easiest way to get data into {{elastic-sec}} is through one of our hundreds of ready-made integrations. You can add an integration directly from the **Get Started** page within the **Ingest your data** section:
49
+
1. At the top of the page, click **Set up Security**.
50
+
2. In the Ingest your data section, click **Add data with integrations**.
51
+
3. Choose from one of our recommended integrations, or select another tab to browse by category.
Elastic also provides different [ingestion methods](/manage-data/ingest.md) to meet your infrastructure needs.
27
58
28
59
:::{{tip}}
29
-
If you have data from a source that doesn't yet have an integration, you can use our [Automatic Import tool](/solutions/security/get-started/automatic-import.md).
60
+
If you have data from a source that doesn't yet have an integration, you can use [Automatic Import](/solutions/security/get-started/automatic-import.md) to create one using AI.
30
61
:::
31
62
::::
32
63
@@ -35,7 +66,7 @@ Not sure where to start exploring {{elastic-sec}}
35
66
or which features may be relevant to you? Continue to the next topic to view our [quickstart guides](../security/get-started/quickstarts.md), each of which is tailored to a specific use case and helps you complete a core task so you can get up and running.
36
67
::::
37
68
38
-
:::::
69
+
::::::
39
70
40
71
## Related resources
41
72
@@ -44,5 +75,6 @@ Use these resources to learn more about {{elastic-sec}} or get started in a diff
44
75
* Migrate your SIEM rules from Splunk's Search Processing Language (SPL) to Elasticsearch Query Language ({{esql}}) using [Automatic Migration](../security/get-started/automatic-migration.md).
45
76
* Check out the numerous [Security integrations](https://www.elastic.co/integrations/data-integrations?solution=security) available to collect and process your data.
46
77
* Get started with [AI for Security](../security/ai.md).
78
+
* Learn how to use {{es}} Query Language ({{esql}}) for [security use cases](/solutions/security/esql-for-security.md).
47
79
* View our [release notes](../../release-notes/elastic-security/index.md) for the latest updates.
Copy file name to clipboardExpand all lines: solutions/security/get-started/get-started-cloud-security.md
+14-14Lines changed: 14 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,6 +3,8 @@ navigation_title: Secure your cloud assets with cloud security posture managemen
3
3
description: A quick start guide to securing your cloud assets using {{elastic-sec}}.
4
4
applies_to:
5
5
serverless:
6
+
security: all
7
+
stack:
6
8
products:
7
9
- id: security
8
10
---
@@ -13,21 +15,21 @@ In this quickstart guide, you'll learn how to get started with Elastic Security
13
15
14
16
## Prerequisites
15
17
16
-
*Access to an {{sec-serverless}} project. If you don't have one yet, refer to [Create a Security project](/solutions/security/get-started/create-security-project.md) to learn how to create one.
18
+
*You can follow this guide using any deployment. To get up and running quickly, we recommend [](/solutions/security/elastic-security-serverless.md) with the **Security Analytics Complete**[feature tier](/deploy-manage/deploy/elastic-cloud/project-settings.md#elastic-sec-project-features). For a complete list of deployment options, refer to [](/deploy-manage/deploy.md#choosing-your-deployment-type).
17
19
* An admin account for the cloud service provider (CSP) you want to use.
18
20
19
21
20
22
## Add the Cloud Security Posture Management integration
21
23
22
-
The Cloud Security Posture Management (CSPM) integration helps you identify and remediate configurations risks that could potentially undermine the confidentiality, integrity, and availability of your data in the cloud.
24
+
The Cloud Security Posture Management (CSPM) integration helps you identify and remediate configuration risks that could undermine the confidentiality, integrity, and availability of your cloud data.
23
25
24
26
To add the CSPM integration:
25
27
26
28
1. On the **Get Started** home page, in the **Ingest your data** section, select the **Cloud** tab.
27
29
2. Select **Cloud Security Posture Management (CSPM)**, then click Add **Cloud Security Posture Management (CSPM)**. The integration configuration page displays.
28
-
3. For this guide, we'll be using AWS single account for configuration. Select these options in the configuration integration section.
30
+
3. For this guide, we'll be using a single AWS account. Select these options in the **Configure integration** section.
29
31
4. Give the integration a name and enter an optional description.
30
-
5. Next, choose your deployment option. An agent-based deployment requires you to deploy and manage {{agent}} in the cloud account you want to monitor, whereas an agentless deployment allows you to collect cloud posture data without having to manage the {{agent}} deployment in your cloud. For simplicity, select **Agentless**.
32
+
5. Next, choose your deployment option. An agent-based deployment requires you to deploy and manage {{agent}} in the cloud account you want to monitor, whereas an agentless deployment allows you to collect cloud posture data without managing the {{agent}} deployment in your cloud. For simplicity, select **Agentless**.
31
33
6. Next, in the **Setup Access** section, choose your preferred authentication method—direct access keys (recommended) or temporary keys. For this guide, we'll use direct access keys.
32
34
7. Expand the Steps to Generate AWS Account Credentials, and follow the instructions.
33
35
8. Once you've generated an access key ID and secret access key and pasted the credentials, click **Save and continue** to complete deployment. Your data should start to appear within a few minutes.
@@ -37,17 +39,15 @@ To add the CSPM integration:
37
39
:screenshot:
38
40
:::
39
41
40
-
% insert image
41
-
42
42
:::{{{note}}}
43
-
Consider also adding the Cloud Native Vulnerability Management (CNVM) integration, which identifies vulnerabilities in your cloud workloads.
43
+
Consider adding the Cloud Native Vulnerability Management (CNVM) integration, which identifies vulnerabilities in your cloud workloads.
44
44
:::
45
45
46
46
## View the Cloud Security Posture dashboard
47
47
48
-
The Cloud Posture dashboard summarizes your cloud infrastructure's overall performance against security guidelines defined by the Center for Internet Security (CIS). It shows configuration risk metrics for all of your monitored cloud accounts and Kubernetes clusters and groups them by specific parameters. All configuration risks the integration identifies are called benchmark rules, and are listed on the **Findings** page.
48
+
The Cloud Posture dashboard summarizes your cloud infrastructure's overall performance against security guidelines defined by the Center for Internet Security (CIS). It shows configuration risk metrics for all your monitored cloud accounts and Kubernetes clusters and groups them by specific parameters. All configuration risks the integration identifies are called benchmark rules and are listed on the **Findings** page.
49
49
50
-
The dashboard also shows your overall compliance score, and your compliance score for each CIS section. Use these scores to determine how securely configured your overall cloud environment is. To learn more, refer to our [documentation](/solutions/security/cloud/cspm-dashboard.md).
50
+
The dashboard also shows your overall compliance score and your compliance score for each CIS section. Use these scores to determine how securely configured your overall cloud environment is. To learn more, refer to our [documentation](/solutions/security/cloud/cspm-dashboard.md).
@@ -59,7 +59,7 @@ To access the Cloud Security Posture dashboard, go to **Dashboards** → **Cloud
59
59
60
60
## Analyze Findings
61
61
62
-
After you install the CSPM integration, it evaluates the configuration of resources in your environment every 24 hours. It lists the results and whether a given resource passed or failed evaluation against a specific security guideline on the **Findings** page, which you can access from the navigation menu. By default, the Findings page lists all findings without any grouping or filtering. However, we recommend [filtering the data](/solutions/security/cloud/findings-page.md#cspm-findings-page-filter-findings) for failed findings. You can also [customize](/solutions/security/cloud/findings-page.md#cspm-customize-the-findings-table) the table to control which columns appear.
62
+
After you install the CSPM integration, it evaluates the configuration of resources in your environment every 24 hours. It lists the results and whether a given resource passed or failed evaluation against a specific security guideline on the **Findings** page, which you can access from the navigation menu. By default, the Findings page lists all findings without grouping or filtering. However, we recommend [filtering the data](/solutions/security/cloud/findings-page.md#cspm-findings-page-filter-findings) for failed findings. You can also [customize](/solutions/security/cloud/findings-page.md#cspm-customize-the-findings-table) the table to control which columns appear.
63
63
64
64
To remediate a failed finding, click the arrow to the left of a failed finding to open the findings flyout, then follow the steps under **Remediation**.
65
65
@@ -74,13 +74,13 @@ On the Cloud Security Posture dashboard, click one of the "View all failed findi
74
74
75
75
### Set up alerts
76
76
77
-
To monitor your configuration more closely, we recommend creating detection rules to detect specific failed findings, which if found, generates an alert.
77
+
To monitor your configuration more closely, we recommend creating detection rules to detect specific failed findings, which, if found, generate an alert.
78
78
79
-
You can create detection rule directly from the **Findings** page:
79
+
You can create a detection rule directly from the **Findings** page:
80
80
81
81
1. Click the arrow to the left of a finding to open the findings flyout.
82
-
2. Click **Take action**, then **Create a detection rule**. This creates a detection rule that creates alerts when the associated benchmark rule generates a failed finding.
83
-
3. To review or customize the new rule, click **View rule**. For example, you may want to set up a rule action—like an email or Slack notification—when alerts are generated. To learn more about rule actions, refer to [](/solutions/security/detect-and-alert/create-detection-rule.md#rule-notifications).
82
+
2. Click **Take action**, then **Create a detection rule**.
83
+
3. To review or customize the new rule, click **View rule**. For example, you might want to set up a rule action—like an email or Slack notification—when alerts are generated. To learn more about rule actions, refer to [](/solutions/security/detect-and-alert/create-detection-rule.md#rule-notifications).
0 commit comments