Cloud Security

edit

Elastic Security for Cloud helps you improve your cloud security posture by comparing your cloud configuration to best practices, and scanning for vulnerabilities. It also helps you monitor and investigate your cloud workloads inside and outside Kubernetes.

This page describes what each solution does and provides links to more information.

Cloud Security Posture Management (CSPM)

edit

Discovers and evaluates the services in your cloud environment — like storage, compute, IAM, and more — against configuration security guidelines defined by the Center for Internet Security (CIS) to help you identify and remediate risks that could undermine the confidentiality, integrity, and availability of your cloud data.

Read the CSPM docs.

Kubernetes Security Posture Management (KSPM)

edit

Allows you to identify configuration risks in the various components that make up your Kubernetes cluster. It does this by evaluating your Kubernetes clusters against secure configuration guidelines defined by the Center for Internet Security (CIS) and generating findings with step-by-step instructions for remediating potential security risks.

Read the KSPM docs.

Cloud Native Vulnerability Management (CNVM)

edit

Scans your cloud workloads for known vulnerabilities. When it finds a vulnerability, it supports your risk assessment by quickly providing information such as the vulnerability’s CVSS and severity, which software versions it affects, and whether a fix is available.

Read the CNVM docs.

Cloud Workload Protection for VMs

edit

Helps you monitor and protect your Linux VMs. It uses Elastic Defend to instantly detect and prevent malicious behavior and malware, and captures workload telemetry data for process, file, and network activity. You can use this data with Elastic’s out-of-the-box detection rules and machine learning models. These detections generate alerts that quickly help you identify and remediate threats.

Read the CWP for VMs docs.