-
Notifications
You must be signed in to change notification settings - Fork 191
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Updates "Cloud native security" to "Cloud security" (#6175)
* Updates "Cloud native security" to "Cloud security" * incorporates Smriti's and Nick's reviews * Capitalizes S in Security (cherry picked from commit 863c54f) # Conflicts: # docs/serverless/cloud-native-security/cloud-native-security-overview.asciidoc # docs/serverless/security-overview.asciidoc
- Loading branch information
1 parent
321011f
commit d7e6cf8
Showing
4 changed files
with
97 additions
and
2 deletions.
There are no files selected for viewing
2 changes: 1 addition & 1 deletion
2
docs/cloud-native-security/cloud-native-security-index.asciidoc
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
51 changes: 51 additions & 0 deletions
51
docs/serverless/cloud-native-security/cloud-native-security-overview.asciidoc
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,51 @@ | ||
[[security-cloud-native-security-overview]] | ||
= Cloud Security | ||
|
||
// :description: Helps you improve your cloud security posture. | ||
// :keywords: serverless, security, overview, cloud security | ||
|
||
|
||
Elastic Security for Cloud helps you improve your cloud security posture by comparing your cloud configuration to best practices, and scanning for vulnerabilities. It also helps you monitor and investigate your cloud workloads inside and outside Kubernetes. | ||
|
||
This page describes what each solution does and provides links to more information. | ||
|
||
[discrete] | ||
[[security-cloud-native-security-overview-cloud-security-posture-management-cspm]] | ||
== Cloud Security Posture Management (CSPM) | ||
|
||
Discovers and evaluates the services in your cloud environment — like storage, compute, IAM, and more — against configuration security guidelines defined by the https://www.cisecurity.org/[Center for Internet Security] (CIS) to help you identify and remediate risks that could undermine the confidentiality, integrity, and availability of your cloud data. | ||
|
||
<<security-cspm,Read the CSPM docs>>. | ||
|
||
[discrete] | ||
[[security-cloud-native-security-overview-kubernetes-security-posture-management-kspm]] | ||
== Kubernetes Security Posture Management (KSPM) | ||
|
||
Allows you to identify configuration risks in the various components that make up your Kubernetes cluster. | ||
It does this by evaluating your Kubernetes clusters against secure configuration guidelines defined by the Center for Internet Security (CIS) and generating findings with step-by-step instructions for remediating potential security risks. | ||
|
||
<<security-kspm,Read the KSPM docs>>. | ||
|
||
[discrete] | ||
[[security-cloud-native-security-overview-cloud-native-vulnerability-management-cnvm]] | ||
== Cloud Native Vulnerability Management (CNVM) | ||
|
||
Scans your cloud workloads for known vulnerabilities. When it finds a vulnerability, it supports your risk assessment by quickly providing information such as the vulnerability's CVSS and severity, which software versions it affects, and whether a fix is available. | ||
|
||
<<security-vuln-management-overview,Read the CNVM docs>>. | ||
|
||
[discrete] | ||
[[security-cloud-native-security-overview-cloud-workload-protection-for-kubernetes]] | ||
== Cloud Workload Protection for Kubernetes | ||
|
||
Provides cloud-native runtime protections for containerized environments by identifying and (optionally) blocking unexpected system behavior in Kubernetes containers. These capabilities are sometimes referred to as container drift detection and prevention. The solution also captures detailed process and file telemetry from monitored containers, allowing you to set up custom alerts and protection rules. | ||
|
||
<<security-d4c-overview,Read the CWP for Kubernetes docs>>. | ||
|
||
[discrete] | ||
[[security-cloud-native-security-overview-cloud-workload-protection-for-vms]] | ||
== Cloud Workload Protection for VMs | ||
|
||
Helps you monitor and protect your Linux VMs. It uses {elastic-defend} to instantly detect and prevent malicious behavior and malware, and captures workload telemetry data for process, file, and network activity. You can use this data with Elastic's out-of-the-box detection rules and {ml} models. These detections generate alerts that quickly help you identify and remediate threats. | ||
|
||
<<security-cloud-workload-protection,Read the CWP for VMs docs>>. |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,44 @@ | ||
[[security-overview]] | ||
= {elastic-sec} overview | ||
|
||
// :keywords: serverless, security, reference | ||
|
||
|
||
{elastic-sec} combines threat detection analytics, cloud native security, and endpoint protection capabilities in a single solution, so you can quickly detect, investigate, and respond to threats and vulnerabilities across your environment. | ||
|
||
{elastic-sec} provides: | ||
|
||
* A detection engine that identifies a wide range of threats | ||
* A workspace for event triage, investigation, and case management | ||
* Interactive data visualization tools | ||
* Integrations for collecting data from various sources | ||
|
||
[discrete] | ||
[[siem-integration]] | ||
== Learn more | ||
|
||
* <<security-ui,{elastic-sec} UI overview>>: Navigate {elastic-sec}'s various tools and interfaces. | ||
* <<security-about-rules,Detection rules>>: Use {elastic-sec}'s detection engine with custom and prebuilt rules. | ||
* <<security-cloud-native-security-overview,Cloud security>>: Enable cloud native security capabilities such as Cloud and Kubernetes security posture management, cloud vulnerability management, and cloud workload protection for Kubernetes and VMs. | ||
* <<security-install-edr,Install {elastic-defend}>>: Enable key endpoint protection capabilities like event collection and malicious activity prevention. | ||
* https://www.elastic.co/products/stack/machine-learning[{ml-cap}]: Enable built-in {ml} tools to help you identify malicious behavior. | ||
* <<security-advanced-entity-analytics,Advanced entity analytics>>: Leverage {elastic-sec}'s detection engine and {ml} capabilities to generate comprehensive risk analytics for hosts and users. | ||
* <<security-ai-assistant,Elastic AI Assistant>>: Ask AI Assistant questions about how to use {elastic-sec}, how to understand particular alerts and other documents, and how to write {esql} queries. | ||
|
||
[discrete] | ||
[[elastic-search-and-kibana]] | ||
== {es} and {kib} | ||
|
||
{elastic-sec} uses {es} for data storage, management, and search, and {kib} is its main user interface. Learn more: | ||
|
||
* https://www.elastic.co/products/elasticsearch[{es}]: A real-time, | ||
distributed storage, search, and analytics engine. {elastic-sec} stores your data using {es}. | ||
* https://www.elastic.co/products/kibana[{kib}]: An open-source analytics and | ||
visualization platform designed to work with {es} and {elastic-sec}. {kib} allows you to search, | ||
view, analyze and visualize data stored in {es} indices. | ||
|
||
[discrete] | ||
[[self-protection]] | ||
=== {elastic-endpoint} self-protection | ||
|
||
For information about {elastic-endpoint}'s tamper-protection features, refer to <<security-endpoint-self-protection>>. |