Features and Functions
Based on cloud native security, SecMaster provides a comprehensive closed-loop security handling process that contains log collection, security governance, intelligent analysis, situation awareness, and orchestration response, helping you protect cloud security.
SecMaster provides Security Overview, Workspace Management, #secmaster_01_0003/section5377133145011, Security Situation, Asset Management, Risk Prevention, Security Response, Security Orchestration, Data Collection, and Data Integration.
Security Overview
The Security Overview page gives you a comprehensive view of your asset security posture together with other linked cloud security services to collectively display security assessment findings.
Function Module |
Description |
---|---|
Security Score |
SecMaster comes in different editions to evaluate and score your cloud asset security. You can quickly learn of unhandled risks and their threats to your assets. The lower the security score, the greater the overall asset security risk. |
Security Monitoring |
You can view how many threats, vulnerabilities, and compliance risks that are not handled and view details of them. |
Your Security Score over Time |
You can view your security scores for the last 7 days. |
Workspace Management
Workspaces are top-level workbenches in SecMaster. A single workspace can be bound to common projects, enterprise projects, and regions for different application scenarios.
Security Situation
You can view the security overview on the large screen in real time and periodically subscribe to security operation reports to know the core security indicators.
Function Module |
Description |
|
---|---|---|
Security Score |
SecMaster evaluates and scores your cloud asset security. You can quickly learn of unhandled risks and their threats to your assets. The lower the security score, the greater the overall asset security risk. |
|
Security Monitoring |
You can view how many threats, vulnerabilities, and compliance risks that are not handled and view details of them. |
|
Your Security Score over Time |
You can view your security scores for the last 7 days. |
|
AI analyzes and classifies massive cloud security data and then displays security incidents in real time on a large screen. The large screen display gives you a simple, intuitive, bird's eye view of the security of your entire network clearly and efficiently. |
||
You can generate analysis reports. In this way, you can learn about the security status of your assets in a timely manner. |
||
Displays the tasks to be processed in a centralized manner. |
Asset Management
SecMaster automatically discovers and manages all assets on and off the cloud and displays the real-time security status of your assets.
Function Module |
Description |
---|---|
Synchronizes the security statistics of all resources and allows you to view the name, service, and security status of a resource, helping you quickly locate security risks. |
Risk Prevention
Risk prevention provides baseline check and vulnerability management to help your cloud security configuration meet authoritative security standards, such as DJCP, ISO, and PCI, as well as Huawei Cloud security best practice standards. You can learn about the global vulnerability distribution.
Function Module |
Description |
---|---|
SecMaster can scan cloud baseline configurations to find out unsafe settings, report alerts for incidents, and offer hardening suggestions to you. |
|
Automatically synchronizes vulnerability scanning result from Huawei Cloud Host Security Service (HSS), displays vulnerability scanning details by category, allows users to view vulnerability details, and provides vulnerability fixing suggestions. |
|
SecMaster supports centralized management of defense and emergency policies. |
Security Response
Threat operation provides various threat detection models to help you detect threats from massive security logs and generate alerts; provides various security response playbooks to help you automatically analyze and handle alerts, and automatically harden security defense and security configurations.
Function Module |
Description |
|
---|---|---|
Displays incident details in a centralized manner and supports manually or automatically turning alerts into incidents. |
||
Provides unified data class management (security operation objects) and built-in Huawei Cloud alert standards. Integrates and displays alerts of various cloud services, including HSS, WAF, and Anti-DDoS. |
||
Provides unified data class management (security operations objects) and built-in Huawei Cloud threat indicator standards. Integrates indicators of many cloud services and extracts indicators based on custom alert and incident rules. |
||
Alert models can be built. |
||
Security Analysis |
|
|
Supports end-to-end data traffic monitoring and management. |
||
|
Security Orchestration
Security Orchestration supports playbook management, process management, data class management (security entity objects), and asset connection management. You can also customize playbooks and processes.
Security Orchestration allows you to flexibly orchestrate security response playbooks through drag-and-drop according to your service requirements. You can also flexibly extend and define security operation objects and interfaces.
Function Module |
Description |
---|---|
Manages operation objects such as data classes, data class types, and category mappings in a centralized manner. |
|
Supports full lifecycle management of playbooks, processes, connections, and instances. |
|
Provides a visualized low-code development platform for customized layout of security analysis reports, alarm management, incident management, vulnerability management, baseline management, and threat indicator library management. |
|
Plug-ins used in the security orchestration process can be managed in a unified manner. |
Data Collection
Collects various log data in multiple modes. After data is collected, historical data analysis and comparison, data association analysis, and unknown threat discovery can be quickly implemented.
Function Module |
Description |
---|---|
Logstash is used to collect various log data in multiple modes. After data is collected, historical data analysis and comparison, data association analysis, and unknown threat discovery can be quickly implemented. |
Data Integration
Integrate security ecosystem products for associated operations or data interconnection. After the integration, you can search for and analyze all collected logs.
Function Module |
Description |
---|---|
The built-in log collection system supports one-click integration of logs from Huawei Cloud cloud products, covering storage, management, monitoring, and security. After the integration, you can search for and analyze all collected logs. |
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.