Cloud Security Posture dashboard

edit

The Cloud Security Posture dashboard summarizes your cloud infrastructure’s overall performance against security guidelines defined by the Center for Internet Security (CIS). To get started monitoring your security posture, refer to Get started with Cloud Security Posture Management or Get started with Kubernetes Security Posture Management.

The cloud Security dashboard

The Cloud Security Posture dashboard shows:

  • Configuration risk metrics for all monitored cloud accounts and Kubernetes clusters
  • Configuration risk metrics for individual cloud accounts and Kubernetes clusters
  • Configuration risks grouped by CIS Section (security guideline category)

Cloud Security Posture dashboard UI

edit

At the top of the dashboard, you can switch between the cloud accounts and Kubernetes clusters views.

The top section of either view summarizes your overall cloud security posture (CSP) by aggregating data from all monitored resources. The summary cards on the left show the number of cloud accounts or clusters evaluated, and the number of resources evaluated. You can click Enroll more accounts or Enroll more clusters to deploy to additional cloud assets. Click View all resources to open the Findings page.

The remaining summary cards show your overall posture score, and total failed findings grouped by CIS section. Click View all failed findings to view all failed findings, or click a CIS section name to view failed findings from only that section on the Findings page.

Below the summary section, each row shows the CSP of a single cloud account or Kubernetes cluster, including its name, when its posture was last evaluated, its compliance score, and failed findings grouped by CIS section. When you begin to monitor a new account or cluster, a new row appears.

A row representing a single cluster in the Cloud Security Posture dashboard

FAQ (Frequently Asked Questions)

edit
When do newly-enrolled assets appear on the dashboard?

It can take up to 10 minutes for deployment, resource fetching, evaluation, and data processing before a newly-enrolled AWS account or Kubernetes cluster appears on the dashboard.

When do unenrolled accounts disappear from the dashboard?

An account will disappear as soon as your integration fetches data while that account is not enrolled. The fetch process repeats every four hours, which means a newly unenrolled account can take a maximum of four hours to disappear from the dashboard.