Skip to main contentCloudnosys provides a comprehensive suite of security features to protect your cloud infrastructure across AWS, GCP, and Azure.
Compliance Management
Ensure your cloud infrastructure meets industry standards and regulatory requirements.
Supported Standards
- CIS Benchmarks: Follow Center for Internet Security best practices
- ISO Standards: Meet ISO 27001 and related security standards
- SOC 2: Maintain System and Organization Controls compliance
- Custom Policies: Create and enforce your own compliance policies
Real-time Monitoring
Continuous monitoring of your cloud environment to detect threats as they happen.
Monitoring Features
- 24/7 Surveillance: Round-the-clock monitoring of your infrastructure
- Threat Detection: Immediate alerts for suspicious activities
- Anomaly Detection: Identify unusual patterns and behaviors
- Event Logging: Comprehensive audit trails for all security events
Multi-Cloud Support
Manage security across multiple cloud providers from a single platform.
- AWS Integration: Full support for Amazon Web Services
- GCP Integration: Complete Google Cloud Platform coverage
- Azure Integration: Microsoft Azure security management
Dashboard & Reporting
- Unified Dashboard: View all security metrics in one place
- Customizable Reports: Generate reports tailored to your needs
- Alert Management: Configure and manage security alerts
- Historical Data: Track security trends over time
Configuring Your First Scan
Once you’ve added your cloud account (AWS or GCP) and configured the necessary settings, Cloudnosys automatically starts the first scan to assess the security and compliance posture of your cloud resources. This guide explains what happens during the initial scan and how to configure it properly.
Overview
The initial scan is a comprehensive assessment that evaluates different aspects of your cloud security depending on the protection level (Basic or Advanced) you’ve selected. This scan provides the foundation for ongoing security monitoring and compliance reporting.
Basic Package Scan
For users who select the Basic package, the initial scan will focus on essential Cloud Security Posture Management (CSPM) checks.
Key Assessments
1. Misconfigurations
Cloudnosys checks for misconfigured resources in your cloud account, including:
- Security Groups: Incorrectly configured security groups with overly permissive rules
- IAM Roles: Overly permissive IAM roles and policies
- Storage Security: Unencrypted storage buckets and databases
- Network Configuration: Misconfigured VPCs and subnets
- Access Controls: Improper access control configurations
2. Service Account Validation
- Permission Verification: Ensures the service account has valid permissions
- Access Validation: Confirms access to the resources it needs to monitor
- Role Verification: Validates that necessary roles exist and are properly configured
3. Authentication Verification
- Authentication Method: Verifies that the authentication method (IAM role, service account) is set up correctly
- Secure Communication: Ensures that Cloudnosys can securely interact with your cloud resources
- Permission Validation: Confirms that authentication provides necessary access
4. Resource Access Validation
- Resource Discovery: Ensures Cloudnosys can discover and access cloud resources
- Permission Verification: Confirms access to EC2 instances, storage buckets, and IAM roles
- Scope Validation: Verifies that the scan covers all intended resources
5. Resource Accessibility
- Data Retrieval: Confirms that Cloudnosys can retrieve information about cloud resources
- Analysis Capability: Ensures the platform can analyze security and compliance status
- Coverage Verification: Validates that all intended resources are accessible for scanning
Scan Results
Once the scan is completed, Cloudnosys will provide you with a summary of findings, highlighting any misconfigurations or security risks that need attention.
Advanced Package Scan
For users who select the Advanced package, the scan includes all the checks in the Basic package, with additional features for enhanced security and real-time monitoring.
Additional Advanced Features
1. Enhanced Misconfiguration Detection
- Comprehensive Coverage: All Basic package misconfiguration checks
- Advanced Rules: Additional security rules and compliance checks
- Custom Policies: Support for custom security policies
2. Cloudnosys-Security-Role Validation
- Role Verification: Confirms that the Cloudnosys-Security-Role has been successfully fetched
- Permission Validation: Ensures the role has necessary permissions for comprehensive scanning
- Cross-Account Access: Validates access across multiple accounts and regions
3. Enhanced Authentication
- Multi-Factor Authentication: Support for MFA-enabled accounts
- Cross-Service Authentication: Validates authentication across multiple cloud services
- Advanced Security: Enhanced security measures for authentication
4. Comprehensive Resource Access
- Full Resource Discovery: Enhanced resource discovery capabilities
- Cross-Service Scanning: Ability to scan resources across multiple cloud services
- Advanced Permissions: Support for complex permission structures
5. EagleEye Integration
- Real-time Monitoring: Continuous monitoring of cloud resources
- Threat Detection: Real-time detection of suspicious activities
- Alert System: Immediate alerts for security incidents
- Incident Response: Automated response to detected threats
6. CloudXray Integration
- Malware Detection: Scans for known malware in your workloads
- Vulnerability Scanning: Identifies OS and application vulnerabilities
- Container Security: Scans container images for security issues
- Continuous Monitoring: Regular scans to detect new threats
Scan Configuration
Pre-Scan Setup
Before the scan begins, ensure:
- Account Connection: Your cloud account is properly connected
- Permissions: All necessary permissions are granted
- Resource Access: Cloudnosys can access your resources
- Network Configuration: Proper network access is configured
Scan Parameters
Basic Package Parameters
- Scan Scope: All connected resources
- Scan Frequency: Initial scan + scheduled scans
- Resource Types: All supported resource types
- Compliance Frameworks: Basic compliance checks
Advanced Package Parameters
- Enhanced Scope: Extended resource coverage
- Real-time Monitoring: Continuous threat detection
- Advanced Compliance: Extended compliance frameworks
- Custom Rules: Support for custom security rules
Scan Scheduling
Initial Scan
- Automatic: Starts immediately after account setup
- Comprehensive: Full scan of all connected resources
- One-time: Initial assessment of security posture
Scheduled Scans
- Regular Intervals: Automated scans at regular intervals
- Incremental: Scans for changes since last scan
- Customizable: Configurable scan frequency and scope
Understanding Scan Results
Scan Status Indicators
✅ Successful Checks
- Green Indicators: Resources that pass security checks
- Compliant Resources: Resources that meet security standards
- Secure Configurations: Properly configured security settings
⚠️ Warnings
- Yellow Indicators: Resources with minor security issues
- Recommendations: Suggested improvements for security
- Best Practices: Recommendations for better security posture
❌ Critical Issues
- Red Indicators: Resources with critical security issues
- Immediate Action: Issues that require immediate attention
- High Priority: Security risks that need urgent remediation
Scan Reports
Executive Summary
- Overall Security Score: High-level security assessment
- Critical Issues Count: Number of critical security issues
- Compliance Status: Current compliance with security standards
- Recommendations: Top-level recommendations for improvement
Detailed Findings
- Resource-Specific Issues: Detailed issues for each resource
- Remediation Steps: Step-by-step remediation instructions
- Compliance Mapping: Mapping to compliance frameworks
- Risk Assessment: Risk level for each finding
Post-Scan Actions
Immediate Actions
- Review Critical Issues: Address high-priority security issues immediately
- Implement Fixes: Apply recommended security configurations
- Verify Changes: Confirm that fixes are properly implemented
- Re-scan: Run additional scans to verify improvements
Ongoing Monitoring
- Set Up Alerts: Configure alerts for new security issues
- Schedule Regular Scans: Set up automated scanning schedules
- Monitor Trends: Track security posture improvements over time
- Compliance Tracking: Monitor compliance with security standards
Best Practices
Scan Optimization
- Resource Selection: Choose appropriate resources for scanning
- Timing: Schedule scans during low-usage periods
- Scope Management: Balance comprehensive scanning with performance
- Cost Consideration: Consider costs of advanced scanning features
Security Maintenance
- Regular Reviews: Regularly review scan results and findings
- Remediation Tracking: Track progress on fixing security issues
- Policy Updates: Keep security policies up to date
- Training: Ensure team members understand security requirements
Troubleshooting
Common Scan Issues
- Permission Errors: Ensure proper permissions are granted
- Resource Access: Verify that resources are accessible
- Network Issues: Check network connectivity and configuration
- Service Limits: Verify that service limits are not exceeded
Getting Help
- Documentation: Review Cloudnosys documentation for guidance
- Support Team: Contact support for technical assistance
- Community: Join the Cloudnosys community for peer support
- Training: Attend training sessions for advanced features
Conclusion
The first scan is a crucial step in ensuring the security and compliance of your cloud resources. Whether you’re using the Basic package for core CSPM features or the Advanced package for comprehensive protection, Cloudnosys provides the tools you need to maintain a secure cloud environment.
By understanding the scan process and results, you can take immediate action to improve your security posture and establish a foundation for ongoing security monitoring and compliance management.