Cloud Security Watcher concept
    • PDF

    Cloud Security Watcher concept

    • PDF

    Article Summary

    Available in VPC

    This guide explains the service structure, service user permissions, and the necessity of introduction so that you can easily understand and use Cloud Security Watcher.

    Service structure

    The Cloud Security Watcher service is a cloud workload security solution that combines API and agent methods to provide integrated security management for multi-cloud, on-premise, and hybrid environments. It accurately collects and analyzes security data to quickly determine the threat of misconfiguration and provides visibility through a dashboard.
    csw-info_00_flow_en

    Service user permissions

    The Cloud Security Watcher service categorizes users into 3 types and provides different permissions according to their roles.

    • CSA permission: having all rights to the group as a group manager
    • User permission: having read-only access to the accessible assetscsw-info_01_iam_en
    Note

    Only users with CSA permissions can create, add, and delete subgroups within the Settings > Preferences > [Groups] tab menu.

    Need for Cloud Security Watcher

    Multi- and hybrid cloud configurations are increasing based on various cloud services, along with the difficulty of managing the many service resources. In order to prevent cloud security incidents under these circumstances, it is necessary to integrate and manage multiple resources and evaluate the configured environment to easily identify and solve problems.
    Cloud Security Watcher is a cloud security posture management tool (CSPM). It protects and assesses cloud environments from security threats with capabilities such as asset visibility, compliance assessment, and threat remediation. You can quickly detect and take action on security threats in the cloud environment by utilizing key functions provided by the CSPM.

    • Visualization: resource visibility secured by providing means of visualization for major features and risks through the dashboard and detailed view
    • Compliance assessment: evaluation of each product's configuration in the cloud for compliance with key security frameworks
    • Monitoring: continuous monitoring of various configurations to alert you to potential threats when anomalies occur
    • Risk identification: identify and prioritize risks through monitoring and evaluation
    • Response: correction and risk mitigation conducted in case of issues in conjunction with monitoring

    Was this article helpful?

    Changing your password will log you out immediately. Use the new password to log back in.
    First name must have atleast 2 characters. Numbers and special characters are not allowed.
    Last name must have atleast 1 characters. Numbers and special characters are not allowed.
    Enter a valid email
    Enter a valid password
    Your profile has been successfully updated.