-
Notifications
You must be signed in to change notification settings - Fork 163
[Onboarding] Security quickstart guides #2017
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Changes from 15 commits
01a1ed3
55a8a93
1398ade
5e795ee
72ddabb
e5a2ea9
366b047
d620f71
c07f7a3
f6764e8
3a58af1
eb55753
fc4ca94
698fe10
d8ca24b
6e9a726
d430f21
8c8db2f
1663416
726b74b
379d2d1
1da57ed
ac11df3
1db831d
c24626c
a7a9d0f
60fb794
ae04263
e6acf64
807ae30
3c85d8d
e9e1792
18eae0c
8b48968
06a7c1d
b9e32ea
f9f2951
a314cc5
13643c6
414dd02
21bbbe1
a34a171
f596630
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
Original file line number | Diff line number | Diff line change | ||||
---|---|---|---|---|---|---|
@@ -0,0 +1,92 @@ | ||||||
--- | ||||||
navigation_title: Secure your cloud assets with cloud security posture management | ||||||
description: A quick start guide to securing your cloud assets using {{elastic-sec}}. | ||||||
applies_to: | ||||||
serverless: | ||||||
products: | ||||||
- id: security | ||||||
--- | ||||||
|
||||||
# Quickstart: Secure your cloud assets with cloud security posture management | ||||||
|
||||||
In this quickstart guide, you'll learn how to get started with Elastic Security for Cloud Security so you can monitor, detect, and investigate anomalous activity within cloud environments. | ||||||
|
||||||
## Prerequisites | ||||||
|
||||||
* Access to a {{sec-serverless}} project. If you don't have one yet, refer to [Create a Security project](/solutions/security/get-started/create-security-project.md) to learn how to create one. | ||||||
lcawl marked this conversation as resolved.
Outdated
Show resolved
Hide resolved
|
||||||
* An admin account for the cloud service provider (CSP) you want to use. | ||||||
|
||||||
|
||||||
## Add the Cloud Security Posture Management integration | ||||||
|
||||||
The Cloud Security Posture Management (CSPM) integration helps you identify and remediate configurations risks that could potentially undermine the confidentiality, integrity, and availability of your data in the cloud. | ||||||
|
||||||
To add the CSPM integration: | ||||||
|
||||||
1. On the **Get Started** home page, in the **Ingest your data** section, select the **Cloud** tab. | ||||||
2. Select **Cloud Security Posture Management (CSPM)**, then click Add **Cloud Security Posture Management (CSPM)**. The integration configuration page displays. | ||||||
3. For this guide, we'll be using AWS single account for configuration. Select these options in the configuration integration section. | ||||||
4. Give the integration a name and enter an optional description. | ||||||
5. Next, choose your deployment option. An agent-based deployment requires you to deploy and manage {{agent}} in the cloud account you want to monitor, whereas an agentless deployment allows you to collect cloud posture data without having to manage the {{agent}} deployment in your cloud. For simplicity, select **Agentless**. | ||||||
6. Next, in the **Setup Access** section, choose your preferred authentication method — direct access keys (recommended) or temporary keys. For this guide, we'll use direct access keys. | ||||||
lcawl marked this conversation as resolved.
Outdated
Show resolved
Hide resolved
|
||||||
7. Expand the Steps to Generate AWS Account Credentials, and follow the instructions. | ||||||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more.
Suggested change
I would either bold or lowercase "Steps to Generate AWS Account Credentials" |
||||||
8. Once you've generated an Access Key ID and Secret Access Key and pasted the credentials, click **Save and continue** to complete deployment. Your data should start to appear within a few minutes. | ||||||
lcawl marked this conversation as resolved.
Outdated
Show resolved
Hide resolved
|
||||||
|
||||||
:::{image} /solutions/images/security-gs-cloudsec-cspm.png | ||||||
:alt: Cloud Security Posture management integration | ||||||
:screenshot: | ||||||
::: | ||||||
|
||||||
% insert image | ||||||
|
||||||
:::{{{note}}} | ||||||
Consider also adding the Cloud Native Vulnerability Management (CNVM) integration, which identifies vulnerabilities in your cloud workloads. | ||||||
::: | ||||||
|
||||||
## View the Cloud Security Posture dashboard | ||||||
|
||||||
The Cloud Posture dashboard summarizes your cloud infrastructure's overall performance against security guidelines defined by the Center for Internet Security (CIS). It shows configuration risk metrics for all of your monitored cloud accounts and Kubernetes clusters and groups them by specific parameters. All configuration risks the integration identifies are called benchmark rules, and are listed on the **Findings** page. | ||||||
|
||||||
The dashboard also shows your overall compliance score, and your compliance score for each CIS section. Use these scores to determine how securely configured your overall cloud environment is. To learn more, refer to our [documentation](/solutions/security/cloud/cspm-dashboard.md). | ||||||
|
||||||
:::{image} /solutions/images/security-gs-cspm-dashboard.png | ||||||
:alt: Cloud Security Posture dashboard | ||||||
:screenshot: | ||||||
::: | ||||||
|
||||||
To access the Cloud Security Posture dashboard, go to **Dashboards** → **Cloud Security Posture**. | ||||||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. I'd suggest moving this line above the screenshot – it its current place it would be easy to miss. |
||||||
|
||||||
|
||||||
## Analyze Findings | ||||||
|
||||||
After you install the CSPM integration, it evaluates the configuration of resources in your environment every 24 hours. It lists the results and whether a given resource passed or failed evaluation against a specific security guideline on the **Findings** page, which you can access from the left navigation menu. By default, the Findings page lists all findings without any grouping or filtering. However, we recommend [filtering the data](/solutions/security/cloud/findings-page.md#cspm-findings-page-filter-findings) for failed findings. You can also [customize](/solutions/security/cloud/findings-page.md#cspm-customize-the-findings-table) the table to control which columns appear. | ||||||
lcawl marked this conversation as resolved.
Outdated
Show resolved
Hide resolved
|
||||||
|
||||||
To remediate a failed finding, click the arrow to the left of a failed finding to open the findings flyout, then follow the steps under **Remediation**. | ||||||
|
||||||
:::{image} /solutions/images/security-gs-cloudsec-findings-flyout.gif | ||||||
:alt: Findings flyout | ||||||
:screenshot: | ||||||
::: | ||||||
|
||||||
:::{{tip}} | ||||||
On the Cloud Security Posture dashboard, click one of the "View all failed findings" links to display a filtered view. | ||||||
::: | ||||||
|
||||||
### Set up alerts | ||||||
|
||||||
To monitor your configuration more closely, we recommend creating detection rules to detect specific failed findings, which if found, generates an alert. | ||||||
|
||||||
You can create detection rule directly from the Findings page: | ||||||
lcawl marked this conversation as resolved.
Outdated
Show resolved
Hide resolved
|
||||||
|
||||||
1. Click the arrow to the left of a Finding to open the findings flyout. | ||||||
lcawl marked this conversation as resolved.
Outdated
Show resolved
Hide resolved
|
||||||
2. Click Take action, then Create a detection rule. This automatically creates a detection rule that creates alerts when the associated benchmark rule generates a failed finding. | ||||||
lcawl marked this conversation as resolved.
Outdated
Show resolved
Hide resolved
|
||||||
3. To review or customize the new rule, click View rule. For example, you may want to set up a rule action—like an email or Slack notification—when alerts are generated. To learn more about rule actions, refer to [this topic](/solutions/security/detect-and-alert/create-detection-rule.md#rule-notifications). | ||||||
lcawl marked this conversation as resolved.
Outdated
Show resolved
Hide resolved
|
||||||
|
||||||
## More resources | ||||||
|
||||||
Now that you've configured CSPM, check out these other Cloud Security resources: | ||||||
|
||||||
* [CSPM for Google Cloud Posture (GCP)](/solutions/security/cloud/get-started-with-cspm-for-gcp.md) and [Azure](/solutions/security/cloud/get-started-with-cspm-for-azure.md) | ||||||
* [Kubernetes security posture management](/solutions/security/cloud/kubernetes-security-posture-management.md) | ||||||
* [Cloud native vulnerability management](/solutions/security/cloud/cloud-native-vulnerability-management.md) | ||||||
* [Cloud workload protection for VMs](/solutions/security/cloud/cloud-workload-protection-for-vms.md) |
Uh oh!
There was an error while loading. Please reload this page.