Updated on 2023-12-22 GMT+08:00

Edition Differences

SecMaster provides three editions: basic, standard, and professional. Different editions have different features that apply to different scenarios. For details about feature differences, see Feature Differences Between SecMaster Editions. For details about features in each edition, see Features and Functions.

Editions

Table 1 describes SecMaster editions.

Table 1 SecMaster editions

Edition

Billing Mode

Description

Basic

Yearly/Monthly (Free)

Allows you to know your security situation.

Standard

Yearly/Monthly

  • Provides the security situation information and DJCP compliance.
  • Provides plus features, such as Large Screen, Intelligent Analysis, and Security Orchestration.

Professional

  • Pay-per-use billing
  • Yearly/Monthly billing
  • Provides check on operation risks and regulation compliance.
  • Provides plus features, such as Large Screen, Intelligent Analysis, and Security Orchestration.

Feature Differences Between SecMaster Editions

The following table lists the function differences between SecMaster editions.

Table 2 Function differences between SecMaster editions

Function

Function Module

Description

Basic

Standard

Professional

Security Overview

Displays a comprehensive overview of asset security posture together with other linked cloud security services.

Workspace

On the top-level workspace of SecMaster, a single workspace can be bound to common projects, enterprise projects, and regions to support workspace operation modes in different scenarios.

Security Situation

Situation Overview

  • Security Score: SecMaster scores security situation of your system, sorts out risks by severity, and display the risk defense capabilities of your system.
  • Security monitoring: displays security monitoring statistics in real time.
  • Your Security Score over Time: SecMaster displays your security scores for the last 7 days.

Large Screen

SecMaster displays the comprehensive security posture of your assets in the cloud in real time.

×

Security Report

You can generate analysis reports. In this way, you can learn about the security status of your assets in a timely manner.

×

×

Task Hub

Displays the tasks to be processed in a centralized manner.

×

Asset Management

SecMaster synchronizes information about your resources and displays overall security posture in one place.

×

Risk Prevention

Baseline Inspection

SecMaster can scan cloud baseline configurations to find out unsafe settings, report alerts for incidents, and offer hardening suggestions to you.

×

√ (Supports basic baseline checks but does not provide details about check results.)

Bug Management

Automatically synchronizes HSS vulnerability scanning result, displays vulnerability scanning details by category, and provides vulnerability fixing suggestions.

×

×

Policy management

SecMaster supports centralized management of defense and emergency policies.

×

Threat Operations

Incident Management

Displays security threat incidents in a centralized manner.

×

Alert Management

Provides unified security alert management and built-in Huawei Cloud alert standards. Integrates and displays alerts of other cloud services for centralized management.

×

Indicators

Provides unified security threat indicator management and built-in Huawei Cloud threat indicator library standards. Security indicators from other cloud services can be accessed, and custom rules for extracting indicators are supported.

×

×

Intelligent Modeling

Alert models can be built.

×

Security Analysis

Supports data query, analysis, monitoring, and delivery.

×

Security Orchestration

Object Management

Manages data classes, data class types, and category mappings in a centralized manner.

×

Playbooks

Supports full lifecycle management of playbooks, processes, connections, and instances.

×

Layout Management

Provides a visualized low-code development platform for customized layout of security analysis reports, alert management, incident management, vulnerability management, baseline management, and threat indicator library management.

×

Plug-in Management

Plug-ins used in the security orchestration process can be managed centrally.

×

×

Collectors

Logstash is used to collect varied log data in multiple modes. After data is collected, historical data analysis and comparison, data association analysis, and unknown threat discovery can be quickly implemented.

×

Data Integration

Integrates security ecosystem products for associated operations or data interconnection. After the integration, you can search for and analyze all collected logs.

×

√ (Only cloud service alerts can be integrated.)

Directory Customization

You can view existing directories and change the layout.

×

NOTE:

Symbol description:

  • X: indicates that the function is unavailable in the corresponding edition.
  • √: indicates that the function is available in the corresponding edition.
  • : Some functions are supported in standard and professional editions, but you need to purchase a value-added package to use them, such as large screen, security analysis, and playbook orchestration.