Cloud security posture management
The Cloud Security Posture Management (CSPM) feature discovers and evaluates the services in your cloud environment β like storage, compute, IAM, and more β against configuration security guidelines defined by the Center for Internet Security (CIS) to help you identify and remediate risks that could undermine the confidentiality, integrity, and availability of your cloud data.
This feature currently supports agentless and agent-based deployments on Amazon Web Services (AWS), Google Cloud Platform (GCP), and Microsoft Azure. For step-by-step getting started guides, refer to Get started with CSPM for AWS, Get started with CSPM for GCP, or Get started with CSPM for Azure.
Requirements
- CSPM is available to all Elastic Cloud users. On-premise deployments require an Enterprise subscription.
- Elastic Stack version 8.10 or greater.
- CSPM only works in the
Default
Kibana space. Installing the CSPM integration on a different Kibana space will not work. - CSPM is supported only on AWS, GCP, and Azure commercial cloud platforms, and AWS GovCloud. Other government cloud platforms are not supported. Click here to request support.
-
Read
privileges for the following Elasticsearch indices:-
logs-cloud_security_posture.findings_latest-*
-
logs-cloud_security_posture.scores-*
-
- The following Kibana privileges:
- Security:
Read
- Integrations:
Read
- Saved Objects Management:
Read
- Fleet:
All
- Security:
How CSPM works ΒΆ
Using the read-only credentials you will provide during the setup process, it will evaluate the configuration of resources in your environment every 24 hours. After each evaluation, the integration sends findings to Elastic. A high-level summary of the findings appears on the Cloud Security Posture dashboard, and detailed findings appear on the Findings page.