﻿---
title: Quickstart: Secure your cloud assets with cloud security posture management
description: A quick start guide to securing your cloud assets using {{elastic-sec}}.
url: https://www.elastic.co/elastic/docs-builder/docs/3028/solutions/security/get-started/get-started-cloud-security
products:
  - Elastic Security
applies_to:
  - Serverless Security projects: Generally available
  - Elastic Stack: Generally available
---

# Quickstart: Secure your cloud assets with cloud security posture management
In this quickstart guide, you'll learn how to get started with Elastic Security for Cloud Security so you can monitor, detect, and investigate anomalous activity within cloud environments.

## Prerequisites

- You can follow this guide using any deployment. To get up and running quickly, we recommend [Elastic Security Serverless](/elastic/docs-builder/docs/3028/solutions/security/get-started#create-sec-serverless-project) with the **Security Analytics Complete** [feature tier](/elastic/docs-builder/docs/3028/deploy-manage/deploy/elastic-cloud/project-settings#elastic-sec-project-features). For a complete list of deployment options, refer to [Deploy > Choosing your deployment type](/elastic/docs-builder/docs/3028/deploy-manage/deploy#choosing-your-deployment-type).
- An admin account for the cloud service provider (CSP) you want to use.


## Add the Cloud Security Posture Management integration

The Cloud Security Posture Management (CSPM) integration helps you identify and remediate configuration risks that could undermine the confidentiality, integrity, and availability of your cloud data.
To add the CSPM integration:
1. On the **Get Started** home page, in the **Ingest your data** section, select the **Cloud** tab.
2. Select **Cloud Security Posture Management (CSPM)**, then click Add **Cloud Security Posture Management (CSPM)**. The integration configuration page displays.
3. For this guide, we'll be using a single AWS account. Select these options in the **Configure integration** section.
4. Give the integration a name and enter an optional description.
5. Next, choose your deployment option. An agent-based deployment requires you to deploy and manage Elastic Agent in the cloud account you want to monitor, whereas an agentless deployment allows you to collect cloud posture data without managing the Elastic Agent deployment in your cloud. For simplicity, select **Agentless**.
6. Next, in the **Setup Access** section, choose your preferred authentication method—direct access keys (recommended) or temporary keys. For this guide, we'll use direct access keys.
7. Expand the Steps to Generate AWS Account Credentials, and follow the instructions.
8. Once you've generated an access key ID and secret access key and pasted the credentials, click **Save and continue** to complete deployment. Your data should start to appear within a few minutes.

![Cloud Security Posture management integration](https://www.elastic.co/elastic/docs-builder/docs/3028/solutions/images/security-gs-cloudsec-cspm.png)

<note>
  Consider adding the Cloud Native Vulnerability Management (CNVM) integration, which identifies vulnerabilities in your cloud workloads.
</note>


## View the Cloud Security Posture dashboard

The Cloud Posture dashboard summarizes your cloud infrastructure's overall performance against security guidelines defined by the Center for Internet Security (CIS). It shows configuration risk metrics for all your monitored cloud accounts and Kubernetes clusters and groups them by specific parameters. All configuration risks the integration identifies are called benchmark rules and are listed on the **Findings** page.
The dashboard also shows your overall compliance score and your compliance score for each CIS section. Use these scores to determine how securely configured your overall cloud environment is. To learn more, refer to our [documentation](https://www.elastic.co/elastic/docs-builder/docs/3028/solutions/security/cloud/cspm-dashboard).
![Cloud Security Posture dashboard](https://www.elastic.co/elastic/docs-builder/docs/3028/solutions/images/security-gs-cspm-dashboard.png)

To access the Cloud Security Posture dashboard, go to **Dashboards** → **Cloud Security Posture**.

## Analyze Findings

After you install the CSPM integration, it evaluates the configuration of resources in your environment every 24 hours. It lists the results and whether a given resource passed or failed evaluation against a specific security guideline on the **Findings** page, which you can access from the navigation menu. By default, the Findings page lists all findings without grouping or filtering. However, we recommend [filtering the data](/elastic/docs-builder/docs/3028/solutions/security/cloud/findings-page#cspm-findings-page-filter-findings) for failed findings. You can also [customize](/elastic/docs-builder/docs/3028/solutions/security/cloud/findings-page#cspm-customize-the-findings-table) the table to control which columns appear.
To remediate a failed finding, click the arrow to the left of a failed finding to open the findings flyout, then follow the steps under **Remediation**.
![Findings flyout](https://www.elastic.co/elastic/docs-builder/docs/3028/solutions/images/security-gs-cloudsec-findings-flyout.gif)

<tip>
  On the Cloud Security Posture dashboard, click one of the "View all failed findings" links to display a filtered view.
</tip>


### Set up alerts

To monitor your configuration more closely, we recommend creating detection rules to detect specific failed findings, which, if found, generate an alert.
You can create a detection rule directly from the **Findings** page:
1. Click the arrow to the left of a finding to open the findings flyout.
2. Click **Take action**, then **Create a detection rule**.
3. To review or customize the new rule, click **View rule**. For example, you might want to set up a rule action—like an email or Slack notification—when alerts are generated. To learn more about rule actions, refer to [Common rule settings > Rule actions](/elastic/docs-builder/docs/3028/solutions/security/detect-and-alert/common-rule-settings#rule-notifications).


## More resources

Now that you've configured CSPM, check out these other Cloud Security resources:
- [CSPM for Google Cloud Posture (GCP)](https://www.elastic.co/elastic/docs-builder/docs/3028/solutions/security/cloud/get-started-with-cspm-for-gcp) and [Azure](https://www.elastic.co/elastic/docs-builder/docs/3028/solutions/security/cloud/get-started-with-cspm-for-azure)
- [Kubernetes security posture management](https://www.elastic.co/elastic/docs-builder/docs/3028/solutions/security/cloud/kubernetes-security-posture-management)
- [Cloud native vulnerability management](https://www.elastic.co/elastic/docs-builder/docs/3028/solutions/security/cloud/cloud-native-vulnerability-management)
- [Cloud workload protection for VMs](https://www.elastic.co/elastic/docs-builder/docs/3028/solutions/security/cloud/cloud-workload-protection-for-vms)