Functions
Based on cloud native security, SecMaster provides a comprehensive closed-loop security response process that contains log collection, security governance, intelligent analysis, situation awareness, orchestration, and response, helping you protect cloud security.
SecMaster provides basic, standard, and professional editions as well as value-added functions to help meet security requirements in different scenarios.
- Basic edition: helps learn about security posture.
- Standard edition: helps meet operations requirements on security situation and DJCP compliance.
- Professional edition: helps meet requirements on daily operations and regulation compliance.
This topic introduces SecMaster editions and their function differences.
- The value-added package provides extra functions like large screen, security analysis, and security orchestration beyond the standard and professional editions. To use such extra functions, the standard or professional edition must be enabled first.
- The following symbols are used in this topic:
- √: indicates that the function is supported in the corresponding edition.
- ×: indicates that the function is not supported in the corresponding edition.
Security Overview
The Security Overview page gives you a comprehensive view of your asset security posture together with other linked cloud security services to centrally display security assessment findings.
Function Module |
Description |
Basic |
Standard |
Professional |
---|---|---|---|---|
Security Overview |
|
√ |
√ |
√ |
Workspace Management
Workspaces are top-level workbenches in SecMaster. A single workspace can be bound to general projects, enterprise projects, and regions for different application scenarios.
Security Governance
Security Governance provides you with a security governance template and compliance scanning service and converts the standard clauses in security compliance packs into check items.
Function Module |
Description |
Basic |
Standard |
Professional |
---|---|---|---|---|
Security Governance |
NOTE:
Before using security governance in SecMaster, you need to submit a service ticket to enable the service. |
× |
× |
√ |
Purchased Resources
Purchased Resources centrally displays the resources purchased by the current account, making it easier for you to manage them in one place.
Function Module |
Description |
Basic |
Standard |
Professional |
---|---|---|---|---|
Purchased Resources |
You can view resources purchased by the current account on the Purchased Resources page and manage them centrally. |
√ |
√ |
√ |
Security Situation
You can view the security overview on the large screen in real time and periodically subscribe to security operation reports to know the core security indicators.
Function Module |
Description |
Basic |
Standard |
Professional |
---|---|---|---|---|
|
√ |
√ |
√ |
|
SecMaster leverages AI to analyze and classify massive cloud security data and then displays real-time results on a large screen. In a simple, intuitive, and efficient way, you will learn of what risks your cloud environment are facing and how secure your cloud environment is.
NOTE:
The large screen function needs to be purchased separately based on the standard or professional edition. |
× |
√ |
√ |
|
You can generate analysis reports and periodically send them to specified recipients by email. In this way, all recipients can learn about the security status of your assets in a timely manner. |
× |
× |
√ |
|
All tasks that need to be processed are displayed centrally. |
× |
√ |
√ |
Resource Manager
Resource Manager supports centralized management of assets on the cloud and assets outside the cloud and displays their security status in real time.
Function Module |
Description |
Basic |
Standard |
Professional |
---|---|---|---|---|
Resource Manager |
SecMaster can synchronize the security statistics of all resources. So that you can check the name, service, and security status of a resource to quickly locate security risks. |
× |
√ |
√ |
Risk Prevention
Risk prevention provides baseline inspection, vulnerability management, and security policy management to help you check cloud security configurations and meet requirements in many security standards, such as DJCP, ISO, and PCI, as well as Huawei Cloud security best practice standards. You can learn about where vulnerabilities are located in the entire environment and fix them in just a few clicks.
Function Module |
Description |
Basic |
Standard |
Professional |
---|---|---|---|---|
SecMaster can scan cloud baseline configurations to find out unsafe settings, report alerts for incidents, and offer hardening suggestions to you. |
× |
√ |
√ |
|
SecMaster automatically synchronizes vulnerability scan result from Host Security Service (HSS), displays vulnerability scan details by category, and provides vulnerability fixing suggestions. |
× |
× |
√ |
|
SecMaster collects the latest information on known host security vulnerabilities every 5 minutes. |
√ |
√ |
√ |
|
SecMaster supports centralized management of defense and emergency policies. |
× |
√ |
√ |
Threat Operations
Threat operation provides various threat detection models to help you detect threats from massive security logs and generate alerts; provides various security response playbooks to help you automatically analyze and handle alerts, and automatically harden security defense and security configurations.
Function Module |
Description |
Basic |
Standard |
Professional |
---|---|---|---|---|
SecMaster centrally displays incident details and allows you to manually or automatically convert alerts into incidents. |
× |
√ |
√ |
|
Alerts of other cloud services such as HSS, WAF, and DDoS Mitigation are integrated for central display and management. |
× |
√ |
√ |
|
Metrics can be extracted from alerts and incidents based on custom rules. |
× |
× |
√ |
|
Models are supported to scan log data in pipelines. If SecMaster detects data that hits the trigger in a model, SecMaster generates an alert. |
× |
√ |
√ |
|
Security Analysis |
NOTE:
You need to purchase the security analysis function in the value-added package at an extra cost. However, there are some free quotas of security analysis, built-in playbooks, and security orchestration. For details, see . |
× |
√ |
√ |
Security Orchestration
Security Orchestration supports playbook management, process management, data class management (security entity objects), and asset connection management. You can also customize playbooks and processes.
Security Orchestration allows you to flexibly orchestrate security response playbooks through drag-and-drop according to your service requirements. You can also flexibly extend and define security operation objects and interfaces.
Function Module |
Description |
Basic |
Standard |
Professional |
---|---|---|---|---|
Manages operation objects such as data classes, data class types, and categorical mappings in a centralized manner. |
× |
√ |
√ |
|
Supports full lifecycle management of playbooks, processes, connections, and instances.
NOTE:
You need to purchase the security orchestration function in the value-added package at an extra cost. However, there are some free quotas of security analysis, built-in playbooks, and security orchestration. For details, see Free Quota Description. |
× |
√ |
√ |
|
Provides a visualized low-code development platform for customized layout of security analysis reports, alarm management, incident management, vulnerability management, baseline management, and threat indicator library management. |
× |
√ |
√ |
|
Plug-ins used in the security orchestration process can be managed centrally. |
× |
× |
√ |
Data Collection
Collects varied log data in multiple modes. After data is collected, historical data analysis and comparison, data association analysis, and unknown threat discovery can be quickly implemented.
Function Module |
Description |
Basic |
Standard |
Professional |
---|---|---|---|---|
(Collections and Components) |
Logstash is used to collect varied log data in multiple modes. After data is collected, historical data analysis and comparison, data association analysis, and unknown threat discovery can be quickly implemented. |
× |
√ |
√ |
Data Integration
Integrates security ecosystem products for associated operations or data interconnection. After the integration, you can search for and analyze all collected logs.
Function Module |
Description |
Basic |
Standard |
Professional |
---|---|---|---|---|
SecMaster provides a preset log collection system. You can enable access to logs of other cloud services in just a few clicks. After the integration, you can search for and analyze all collected logs. |
× |
√ (Only cloud service alerts can be integrated.) |
√ |
Directory Customization
You can customize directories as needed.
Function Module |
Description |
Basic |
Standard |
Professional |
---|---|---|---|---|
You can view in-use directories and change their layouts. |
× |
√ |
√ |
Free Quota Description
SecMaster provides some free quotas for security analysis and security orchestration in the value-added package. While the free quotas vary depending on the SecMaster editions. The details are as follows:
Function |
Standard |
Professional |
|
---|---|---|---|
Security Analysis |
Security data collection |
120 MB/day/quota |
120 MB/day/quota |
Security data retention |
120 MB/day/quota |
120 MB/day/quota |
|
Security data export |
120 MB/day/quota |
120 MB/day/quota |
|
Platform security data |
40 MB/day/quota |
40 MB/day/quota |
|
Security modeling analysis |
× |
120 MB/day/quota |
|
Threat Management |
Preset threat models |
× |
Calculation model data: 120 MB/day/quota; Preset models: 200 |
Preset response playbooks |
× |
Preset playbooks: 30 |
|
Security Orchestration (SOC) |
Security Orchestration |
× |
Operations: 7,000 |
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot