Security Monitoring overview
    • PDF

    Security Monitoring overview

    • PDF

    Article Summary

    The latest service changes have not yet been reflected in this content. We will update the content as soon as possible. Please refer to the Korean version for information on the latest updates.

    Available in Classic and VPC

    Security Monitoring is a service that safely protects the customer's service by monitoring external security threats in real time and utilizing an automated security system and specialists that can effectively respond to detected events. Security Monitoring has basic and managed services. Basic is a free security service provided by default to all customers using the NAVER Cloud Platform. Managed is a paid security service that strongly protects the resources of NAVER Cloud Platform customers 24/7, and it has more advanced monitoring and control services than the basic.

    Note

    This guide describes how to use Security Monitoring based on the managed service. For a description of the basic service, refer to Basic Security guide.

    Various features provided by Security Monitoring

    The following describes the various features of Security Monitoring.

    • IDS (Intrusion Detection System): an intrusion detection service that detects malicious attacks attempted against the customer's service open to the outside
    • Anti-DDoS (Anti-Distributed Denial of Service): a DDoS attack defense service that supports stable operation of the customer's service by detecting/blocking attacks that deplete resources to prevent the customer's service from being operated normally
    • WAF (Web Application Firewall): a web firewall service that detects and blocks attacking traffic by monitoring web-based (HTTP/HTTPS) traffic
    • Anti-virus: an anti-virus service for servers that supports the stable operation of the customer's service by detecting, isolating, and deleting malware on servers operated by the customer in real time
    • IPS (Intrusion Prevention System): a service that detects and blocks malicious attacks (intrusions) attempted against the customer's service

    Security Monitoring user guide

    Security Monitoring provides services in Korea, US, Singapore, Japan, and Germany regions. The service content is identical in the regions, and please check the following table of contents and their details for smooth use of Security Monitoring.

    • Security Monitoring overview: introduction to Security Monitoring and related resources and FAQ guide
    • Getting ready to use Security Monitoring: information on the required specifications, supported items, and limitations for using Security Monitoring
      • Security Monitoring concept: detailed information on the features supported by Security Monitoring based on region, platform, and service classification
    • VPC: instructions on how to start, use, and manage permissions for Security Monitoring in a VPC environment
      • Get started: how to start using Security Monitoring
      • Using Security Monitoring: how to use monitoring for each security service available in Security Monitoring, how to set notification recipients
        • Dashboard: how to monitor detection and action status by security service
        • Notification Setting: how to set notification recipients when security events occur
      • Manage permissions for Security Monitoring: guide to managing Security Monitoring permissions using a sub account
    • Classic: instructions on how to start, use, and manage permissions for Security Monitoring in a Classic environment
      • Get started: how to start using Security Monitoring
      • Using Security Monitoring: how to use monitoring for each security service available in Security Monitoring, how to set notification recipients
        • Dashboard: how to monitor detection and action status by security service
        • Notification Setting: how to set notification recipients when security events occur
      • Manage permissions for Security Monitoring: guide to managing Security Monitoring permissions using a sub account
    • Security Monitoring glossary: guide to key glossary and descriptions you must know to use Security Monitoring
    • Security Monitoring release notes: the update log for the Security Monitoring guide

    NAVER Cloud Platform provides a variety of related resources as well as a guide to help customers better understand Security Monitoring. If you are a developer or marketer in need of detailed information while you are considering adopting Security Monitoring or establishing related policies, then please make good use of the resources below.

    • Improvement in comprehension and usage methods for Security Monitoring
    • Guides for integrated services required for the use of Security Monitoring
      • Cloud Insight guide: how to use Cloud Insight to manage notification recipients in the notification setting in a VPC environment
      • Monitoring guide: how to use Monitoring that helps the notification recipient management for the notification setting in a Classic environment
      • Sub Account guide: how to use Sub Accounts that help manage operation authorities of Security Monitoring

    Check FAQs first.

    You can get your questions answered quickly by referring to the answers in the FAQ before reading the guide. If you haven't found the answer to your question in the FAQ below, search the guide for what you would like to know.

    Q. What is the anti-virus pattern update cycle of Security Monitoring?
    A. Anti-virus patterns are updated daily at 1 AM, and they are immediately applied to real-time monitoring.

    Q. What is the penetration test and how can I use it?
    A. It refers to performing actions similar to actual attacks to evaluate the security level of the customer's services and resources configured on the NAVER Cloud Platform. However, the customer can't perform security evaluations for infrastructure of the NAVER Cloud Platform or the NAVER Cloud Platform service itself. For the detailed policy and advance request for the penetration test, please refer to NAVER Cloud Platform penetration test support policy and request a form from Support > Support center > Materials in the NAVER Cloud Platform portal.


    Was this article helpful?

    Changing your password will log you out immediately. Use the new password to log back in.
    First name must have atleast 2 characters. Numbers and special characters are not allowed.
    Last name must have atleast 1 characters. Numbers and special characters are not allowed.
    Enter a valid email
    Enter a valid password
    Your profile has been successfully updated.