diff --git a/docs/cloud-native-security/cloud-native-security-index.asciidoc b/docs/cloud-native-security/cloud-native-security-index.asciidoc index c3dde55d5c..742149aa26 100644 --- a/docs/cloud-native-security/cloud-native-security-index.asciidoc +++ b/docs/cloud-native-security/cloud-native-security-index.asciidoc @@ -1,5 +1,5 @@ [[cloud-native-security-overview]] -= Cloud native security += Cloud Security Elastic Security for Cloud helps you improve your cloud security posture by comparing your cloud configuration to best practices, and scanning for vulnerabilities. It also helps you monitor and investigate your cloud workloads inside and outside Kubernetes. This page describes what each solution does and provides links to more information. diff --git a/docs/es-overview.asciidoc b/docs/es-overview.asciidoc index eac0ffc78e..d18648c902 100644 --- a/docs/es-overview.asciidoc +++ b/docs/es-overview.asciidoc @@ -18,7 +18,7 @@ * <>: Learn about system requirements, workspaces, configuration, and data ingestion. * <>: Navigate {elastic-sec}'s various tools and interfaces. * <>: Use {elastic-sec}'s detection engine with custom and prebuilt rules. -* <>: Enable cloud native security capabilities such as Cloud and Kubernetes security posture management, cloud native vulnerability management, and cloud workload protection for Kubernetes and VMs. +* <>: Enable cloud native security capabilities such as Cloud and Kubernetes security posture management, cloud native vulnerability management, and cloud workload protection for Kubernetes and VMs. * <>: Enable key endpoint protection capabilities like event collection and malicious activity prevention. * https://www.elastic.co/products/stack/machine-learning[{ml-cap}]: Enable built-in {ml} tools to help you identify malicious behavior. * <>: Leverage {elastic-sec}'s detection engine and {ml} capabilities to generate comprehensive risk analytics for hosts and users. diff --git a/docs/serverless/cloud-native-security/cloud-native-security-overview.asciidoc b/docs/serverless/cloud-native-security/cloud-native-security-overview.asciidoc new file mode 100644 index 0000000000..e32b1fb326 --- /dev/null +++ b/docs/serverless/cloud-native-security/cloud-native-security-overview.asciidoc @@ -0,0 +1,51 @@ +[[security-cloud-native-security-overview]] += Cloud Security + +// :description: Helps you improve your cloud security posture. +// :keywords: serverless, security, overview, cloud security + + +Elastic Security for Cloud helps you improve your cloud security posture by comparing your cloud configuration to best practices, and scanning for vulnerabilities. It also helps you monitor and investigate your cloud workloads inside and outside Kubernetes. + +This page describes what each solution does and provides links to more information. + +[discrete] +[[security-cloud-native-security-overview-cloud-security-posture-management-cspm]] +== Cloud Security Posture Management (CSPM) + +Discovers and evaluates the services in your cloud environment — like storage, compute, IAM, and more — against configuration security guidelines defined by the https://www.cisecurity.org/[Center for Internet Security] (CIS) to help you identify and remediate risks that could undermine the confidentiality, integrity, and availability of your cloud data. + +<>. + +[discrete] +[[security-cloud-native-security-overview-kubernetes-security-posture-management-kspm]] +== Kubernetes Security Posture Management (KSPM) + +Allows you to identify configuration risks in the various components that make up your Kubernetes cluster. +It does this by evaluating your Kubernetes clusters against secure configuration guidelines defined by the Center for Internet Security (CIS) and generating findings with step-by-step instructions for remediating potential security risks. + +<>. + +[discrete] +[[security-cloud-native-security-overview-cloud-native-vulnerability-management-cnvm]] +== Cloud Native Vulnerability Management (CNVM) + +Scans your cloud workloads for known vulnerabilities. When it finds a vulnerability, it supports your risk assessment by quickly providing information such as the vulnerability's CVSS and severity, which software versions it affects, and whether a fix is available. + +<>. + +[discrete] +[[security-cloud-native-security-overview-cloud-workload-protection-for-kubernetes]] +== Cloud Workload Protection for Kubernetes + +Provides cloud-native runtime protections for containerized environments by identifying and (optionally) blocking unexpected system behavior in Kubernetes containers. These capabilities are sometimes referred to as container drift detection and prevention. The solution also captures detailed process and file telemetry from monitored containers, allowing you to set up custom alerts and protection rules. + +<>. + +[discrete] +[[security-cloud-native-security-overview-cloud-workload-protection-for-vms]] +== Cloud Workload Protection for VMs + +Helps you monitor and protect your Linux VMs. It uses {elastic-defend} to instantly detect and prevent malicious behavior and malware, and captures workload telemetry data for process, file, and network activity. You can use this data with Elastic's out-of-the-box detection rules and {ml} models. These detections generate alerts that quickly help you identify and remediate threats. + +<>. diff --git a/docs/serverless/security-overview.asciidoc b/docs/serverless/security-overview.asciidoc new file mode 100644 index 0000000000..c122e800c6 --- /dev/null +++ b/docs/serverless/security-overview.asciidoc @@ -0,0 +1,44 @@ +[[security-overview]] += {elastic-sec} overview + +// :keywords: serverless, security, reference + + +{elastic-sec} combines threat detection analytics, cloud native security, and endpoint protection capabilities in a single solution, so you can quickly detect, investigate, and respond to threats and vulnerabilities across your environment. + +{elastic-sec} provides: + +* A detection engine that identifies a wide range of threats +* A workspace for event triage, investigation, and case management +* Interactive data visualization tools +* Integrations for collecting data from various sources + +[discrete] +[[siem-integration]] +== Learn more + +* <>: Navigate {elastic-sec}'s various tools and interfaces. +* <>: Use {elastic-sec}'s detection engine with custom and prebuilt rules. +* <>: Enable cloud native security capabilities such as Cloud and Kubernetes security posture management, cloud vulnerability management, and cloud workload protection for Kubernetes and VMs. +* <>: Enable key endpoint protection capabilities like event collection and malicious activity prevention. +* https://www.elastic.co/products/stack/machine-learning[{ml-cap}]: Enable built-in {ml} tools to help you identify malicious behavior. +* <>: Leverage {elastic-sec}'s detection engine and {ml} capabilities to generate comprehensive risk analytics for hosts and users. +* <>: Ask AI Assistant questions about how to use {elastic-sec}, how to understand particular alerts and other documents, and how to write {esql} queries. + +[discrete] +[[elastic-search-and-kibana]] +== {es} and {kib} + +{elastic-sec} uses {es} for data storage, management, and search, and {kib} is its main user interface. Learn more: + +* https://www.elastic.co/products/elasticsearch[{es}]: A real-time, +distributed storage, search, and analytics engine. {elastic-sec} stores your data using {es}. +* https://www.elastic.co/products/kibana[{kib}]: An open-source analytics and +visualization platform designed to work with {es} and {elastic-sec}. {kib} allows you to search, +view, analyze and visualize data stored in {es} indices. + +[discrete] +[[self-protection]] +=== {elastic-endpoint} self-protection + +For information about {elastic-endpoint}'s tamper-protection features, refer to <>.