- Print
- PDF
Cloud Security Watcher concept
- Print
- PDF
Available in VPC
This guide explains the service structure, service user permissions, and the necessity of introduction so that you can easily understand and use Cloud Security Watcher.
Service structure
The Cloud Security Watcher service is a cloud workload security solution that combines API and agent methods to provide integrated security management for multi-cloud, on-premise, and hybrid environments. It accurately collects and analyzes security data to quickly determine the threat of misconfiguration and provides visibility through a dashboard.
Service user permissions
The Cloud Security Watcher service categorizes users into 3 types and provides different permissions according to their roles.
- CSA permission: having all rights to the group as a group manager
- User permission: having read-only access to the accessible assets
Only users with CSA permissions can create, add, and delete subgroups within the Settings > Preferences > [Groups] tab menu.
Need for Cloud Security Watcher
Multi- and hybrid cloud configurations are increasing based on various cloud services, along with the difficulty of managing the many service resources. In order to prevent cloud security incidents under these circumstances, it is necessary to integrate and manage multiple resources and evaluate the configured environment to easily identify and solve problems.
Cloud Security Watcher is a cloud security posture management tool (CSPM). It protects and assesses cloud environments from security threats with capabilities such as asset visibility, compliance assessment, and threat remediation. You can quickly detect and take action on security threats in the cloud environment by utilizing key functions provided by the CSPM.
- Visualization: resource visibility secured by providing means of visualization for major features and risks through the dashboard and detailed view
- Compliance assessment: evaluation of each product's configuration in the cloud for compliance with key security frameworks
- Monitoring: continuous monitoring of various configurations to alert you to potential threats when anomalies occur
- Risk identification: identify and prioritize risks through monitoring and evaluation
- Response: correction and risk mitigation conducted in case of issues in conjunction with monitoring