Functions
Based on cloud native security, SecMaster provides a comprehensive closed-loop security handling process that contains log collection, security governance, intelligent analysis, situation awareness, and orchestration response, helping you protect cloud security.
SecMaster provides Security Overview, Workspace Management, Security Situation, Resource Manager, Risk Prevention, Security Response, Security Orchestration, Data Collection, and Data Integration.
Security Overview
It displays a comprehensive overview of asset security situation together with other linked cloud security services.
Function Module |
Description |
---|---|
Security Score |
SecMaster evaluates and scores your cloud asset security. You can quickly learn of unhandled risks and their threats to your assets. The lower the security score, the greater the overall asset security risk. |
Security Monitoring |
You can view how many threats, vulnerabilities, and compliance risks that are not handled and view details of them. |
Your Security Score over Time |
You can view your security scores for the last 7 days. |
Workspace Management
Workspaces are top-level workbenches in SecMaster. A single workspace can be bound to common projects, to support workspace operation modes in different application scenarios.
Security Situation
You can view the security overview on the large screen in real time and periodically subscribe to security operation reports to know the core security indicators.
Function Module |
Description |
|
---|---|---|
Situation Overview |
Security Score |
The lower the security score, the greater the overall asset security risk. |
Security Monitoring |
You can view how many threats, vulnerabilities, and compliance risks that are not handled and view details of them. |
|
Your Security Score over Time |
You can view your security scores for the last 7 days. |
|
Large Screen |
AI analyzes and classifies massive cloud security data and then displays security incidents in real time on a large screen. The large screen display gives you a simple, intuitive, bird's eye view of the security of your entire network clearly and efficiently. |
|
Reports |
You can generate analysis reports. In this way, you can learn about the security status of your assets in a timely manner. |
|
Task Center |
Displays the tasks to be processed in a centralized manner. |
Resource Manager
SecMaster automatically discovers and manages all assets on and off the cloud and displays the real-time security status of your assets.
Function Module |
Description |
---|---|
Resource Manager |
Synchronizes the security statistics of all resources and allows you to view the name, service, and security status of a resource, helping you quickly locate security risks. |
Risk Prevention
Risk prevention provides baseline check and vulnerability management functions to help your cloud security configurations meet various authoritative security standards, understand the global vulnerability distribution.
Function Module |
Description |
---|---|
Baseline Inspection |
SecMaster can scan cloud baseline configurations to find out unsafe settings, report alerts for incidents, and offer hardening suggestions to you. |
Vulnerabilities |
Automatically synchronizes vulnerability scan results from Host Security Service (HSS), displays vulnerability scanning details by category, allows users to view vulnerability details, and provides vulnerability fixing suggestions. |
Policy Management |
SecMaster supports centralized management of defense and emergency policies. |
Security Response
Threat operation provides various threat detection models to help you detect threats from massive security logs and generate alerts; provides various security response playbooks to help you automatically analyze and handle alerts, and automatically harden security defense and security configurations.
Function Module |
Description |
|
---|---|---|
Incidents |
Displays incident details in a centralized manner and supports manually or automatically turning alerts into incidents. |
|
Alerts |
Integrates and displays alerts of various cloud services, including HSS, WAF, and Anti-DDoS. |
|
Indicators |
Integrates indicators of many cloud services and extracts indicators based on custom alert and incident rules. |
|
Intelligent Modeling |
Alert models can be built. |
|
Security Analysis |
Query and Analysis |
|
Data Monitoring |
Supports end-to-end data traffic monitoring and management. |
|
Data Consumption |
|
Security Orchestration
Security Orchestration supports playbook management, process management, data class management (security entity objects), and asset connection management. You can also customize playbooks and processes.
Security Orchestration allows you to flexibly orchestrate security response playbooks through drag-and-drop according to your service requirements. You can also flexibly extend and define security operation objects and interfaces.
Function Module |
Description |
---|---|
Objects |
Manages operation objects such as data classes, data class types, and categorical mappings in a centralized manner. |
Playbooks |
Supports full lifecycle management of playbooks, processes, connections, and instances. |
Layouts |
Provides a visualized low-code development platform for customized layout of security analysis reports, alarm management, incident management, vulnerability management, baseline management, and threat indicator library management. |
Plugins |
Plug-ins used in the security orchestration process can be managed in a unified manner. |
Data Collection
Collects varied log data in multiple modes. After data is collected, historical data analysis and comparison, data association analysis, and unknown threat discovery can be quickly implemented.
Function Module |
Description |
---|---|
Data Collection |
Logstash is used to collect varied log data in multiple modes. After data is collected, historical data analysis and comparison, data association analysis, and unknown threat discovery can be quickly implemented. |
Data Integration
Integrates security ecosystem products for associated operations or data interconnection. After the integration, you can search for and analyze all collected logs.
Function Module |
Description |
---|---|
Data Integration |
The built-in log collection system supports one-click integration of logs from cloud products, covering storage, management, monitoring, and security. After the integration, you can search for and analyze all collected logs. |
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot