Loading

Security Posture Management

<div class="condensed-table">
| | |
| --- | --- |
| Version | 1.12.0 (View all) |
| Compatible Kibana version(s) | 8.17.0 or higher
9.0.0 or higher |
| Supported Serverless project types
What’s this? | Security |
| Subscription level
What’s this? | Basic |
| Level of support
What’s this? | Elastic |

</div>
Use the Security Posture Management integration to maintain the confidentiality, integrity, and availability of your data in the cloud by continuously identifying configuration risks and vulnerabilities in your cloud infrastructure, like publicly exposed storage buckets, overly permissive networking objects and Log4j vulnerability in workloads. Read below to learn more about the components that make up security posture management; CSPM, KSPM and CNVM.

CSPM discovers and evaluates the services in your cloud environment, like storage, compute, IAM, and more, against hardening guidelines defined by the Center for Internet Security (CIS) to help you identify and remediate configurations risks like:

  • Publicly exposed storage buckets
  • IAM Users without MFA enabled
  • Networking objects that allow ingress to remote server administration ports (22, 3389, etc.)

And much more! For a complete overview of CSPM, including step-by-step getting started guidance, check out CSPM’s documentation.

KSPM discovers and evaluates the components that make up your Kubernetes cluster against hardening guidelines defined by the Center for Internet Security (CIS) to help you identify and remediate configurations risks like:

  • Kubelete servers that allow anonymous auth
  • Unencrypted traffic to load balancers
  • Admission of containers with allowPrivilegeEscalation permissions

And much more! Check out the KSPM getting started guide for step-by-step guidance on how to get started with KSPM.

Cloud Native Vulnerability Management (CNVM) - an efficient and comprehensive solution designed to discover and scan workloads to identify vulnerabilities in your cloud environment. With CNVM, you can effortlessly identify vulnerabilities in your cloud workloads like OS package vulnerabilities, and language-specific packages, among others. Our user-friendly interface also simplifies the process of triaging vulnerabilities and provides detailed vulnerability scan results in a concise and informative manner.

Check out the CNVM getting started guide for step-by-step guidance on how to get started with CNVM.

To use CSPM, KSPM and CNVM, you’ll have to deploy each integration separately. After deploying integrations, the pages described below will begin to get populated with security posture data. Please read the respective use cases section for CSPM and KSPM for step-by-step instructions on how to use these pages to get insight into and improve your cloud security posture.

Page Description
Posture Dashboard The posture dashboard provides an overview of the security posture of both Cloud accounts and Kubernetes clusters monitored. You can access the posture dashboard via the dashboards section of the security solution. Please read the posture dashboard documentation to learn more.
Findings Findings communicate the configuration risks and vulnerabilities discovered in your environments. The findings page will always display the most up-to-date configuration risks and vulnerabilities found. You can access the findings page in the main navigation pane of the security solution. Please read the findings documentation to learn more.
Benchmark Rules Benchmarks hold the configuration rules that are used to assess your specific environments for secure configuration. You can access benchmark rules in the Manage section of the security solution under CLOUD SECURITY POSTURE. To learn more, please read the benchmark rules documentation

As questions come up, check out the KSPM FAQ, CSPM FAQ, CNVM FAQ or reach out to use directly in our community slack workspace in the #security or #cloud-security channels.