Bu sayfa henüz yerel dilinizde mevcut değildir. Daha fazla dil seçeneği eklemek için yoğun bir şekilde çalışıyoruz. Desteğiniz için teşekkür ederiz.

Compute
Elastic Cloud Server
Huawei Cloud Flexus
Bare Metal Server
Auto Scaling
Image Management Service
Dedicated Host
FunctionGraph
Cloud Phone Host
Huawei Cloud EulerOS
Networking
Virtual Private Cloud
Elastic IP
Elastic Load Balance
NAT Gateway
Direct Connect
Virtual Private Network
VPC Endpoint
Cloud Connect
Enterprise Router
Enterprise Switch
Global Accelerator
Management & Governance
Cloud Eye
Identity and Access Management
Cloud Trace Service
Resource Formation Service
Tag Management Service
Log Tank Service
Config
OneAccess
Resource Access Manager
Simple Message Notification
Application Performance Management
Application Operations Management
Organizations
Optimization Advisor
IAM Identity Center
Cloud Operations Center
Resource Governance Center
Migration
Server Migration Service
Object Storage Migration Service
Cloud Data Migration
Migration Center
Cloud Ecosystem
KooGallery
Partner Center
User Support
My Account
Billing Center
Cost Center
Resource Center
Enterprise Management
Service Tickets
HUAWEI CLOUD (International) FAQs
ICP Filing
Support Plans
My Credentials
Customer Operation Capabilities
Partner Support Plans
Professional Services
Analytics
MapReduce Service
Data Lake Insight
CloudTable Service
Cloud Search Service
Data Lake Visualization
Data Ingestion Service
GaussDB(DWS)
DataArts Studio
Data Lake Factory
DataArts Lake Formation
IoT
IoT Device Access
Others
Product Pricing Details
System Permissions
Console Quick Start
Common FAQs
Instructions for Associating with a HUAWEI CLOUD Partner
Message Center
Security & Compliance
Security Technologies and Applications
Web Application Firewall
Host Security Service
Cloud Firewall
SecMaster
Anti-DDoS Service
Data Encryption Workshop
Database Security Service
Cloud Bastion Host
Data Security Center
Cloud Certificate Manager
Edge Security
Blockchain
Blockchain Service
Web3 Node Engine Service
Media Services
Media Processing Center
Video On Demand
Live
SparkRTC
MetaStudio
Storage
Object Storage Service
Elastic Volume Service
Cloud Backup and Recovery
Storage Disaster Recovery Service
Scalable File Service Turbo
Scalable File Service
Volume Backup Service
Cloud Server Backup Service
Data Express Service
Dedicated Distributed Storage Service
Containers
Cloud Container Engine
SoftWare Repository for Container
Application Service Mesh
Ubiquitous Cloud Native Service
Cloud Container Instance
Databases
Relational Database Service
Document Database Service
Data Admin Service
Data Replication Service
GeminiDB
GaussDB
Distributed Database Middleware
Database and Application Migration UGO
TaurusDB
Middleware
Distributed Cache Service
API Gateway
Distributed Message Service for Kafka
Distributed Message Service for RabbitMQ
Distributed Message Service for RocketMQ
Cloud Service Engine
Multi-Site High Availability Service
EventGrid
Dedicated Cloud
Dedicated Computing Cluster
Business Applications
Workspace
ROMA Connect
Message & SMS
Domain Name Service
Edge Data Center Management
Meeting
AI
Face Recognition Service
Graph Engine Service
Content Moderation
Image Recognition
Optical Character Recognition
ModelArts
ImageSearch
Conversational Bot Service
Speech Interaction Service
Huawei HiLens
Video Intelligent Analysis Service
Developer Tools
SDK Developer Guide
API Request Signing Guide
Terraform
Koo Command Line Interface
Content Delivery & Edge Computing
Content Delivery Network
Intelligent EdgeFabric
CloudPond
Intelligent EdgeCloud
Solutions
SAP Cloud
High Performance Computing
Developer Services
ServiceStage
CodeArts
CodeArts PerfTest
CodeArts Req
CodeArts Pipeline
CodeArts Build
CodeArts Deploy
CodeArts Artifact
CodeArts TestPlan
CodeArts Check
CodeArts Repo
Cloud Application Engine
MacroVerse aPaaS
KooMessage
KooPhone
KooDrive

Functions

Updated on 2025-01-20 GMT+08:00

Based on cloud native security, SecMaster provides a comprehensive closed-loop security response process that contains log collection, security governance, intelligent analysis, situation awareness, orchestration, and response, helping you protect cloud security.

Security Overview

The Security Overview page gives you a comprehensive view of your asset security posture together with other linked cloud security services to centrally display security assessment findings.

Table 1 Functions

Function Module

Description

Security Overview

  • Security Score: A security score shows the overall health status of your workloads on the cloud so you can quickly learn of unhandled risks and their threats to your assets.

    The lower the security score, the greater the overall asset security risk.

  • Security Monitoring: You can view how many threats, vulnerabilities, and compliance violations that are not handled and view their details.
  • Security Scores over the Time: You can view the trend of the asset health scores for the last seven days.

Workspace Management

Workspaces are top-level workbenches in SecMaster. A single workspace can be bound to common projects, to support workspace operation modes in different application scenarios.

Table 2 Functions

Function Module

Description

Workspaces

  • Workspace management:

    Workspaces are top-level workbenches in SecMaster. A single workspace can be bound to projects and regions to support workspace operational modes in different scenarios.

Security Governance

Table 3 Functions

Function Module

Function

Security Governance

  • Compliance packs

    SecMaster provides security governance templates, including detailed terms, scan policies, compliance evaluation items, and improvement suggestions from experts. These templates covers PCI DSS, ISO 27701, ISO 27001, privacy protection, and other standards. You can subscribe to and unsubscribe from compliance packs and view results.

  • Policy-based checks

    SecMaster periodically checks the compliance status of cloud assets through policy-as-code-based scanning. You can view compliance risks on the dashboard, and obtain corresponding improvement suggestions from our experts.

  • Self-assessment check items

    SecMaster integrates regulatory clauses and standard requirements into compliance pack check items. You complete evaluation of your services using the compliance pack, and view evaluation results. You can also view historical results, upload and download evidence, and take actions based on suggestions from our experts.

  • Visible compliance results

    SecMaster displays the evaluation results and compliance status on the dashboard, including the compliance rates of the compliance packs you subscribed to, and the compliance rate of each term the regulations and standards, each security, as well as the policy check results.

Purchased Resources

Purchased Resources centrally displays the resources purchased by the current account, making it easier for you to manage them in one place.

Table 4 Functions

Function Module

Description

Purchased Resources

You can view resources purchased by the current account on the Purchased Resources page and manage them centrally.

Security Situation

You can view the security overview on the large screen in real time and periodically subscribe to security operation reports to know the core security indicators.

Table 5 Functions

Function Module

Description

Situation Overview

  • Security Score: A security score shows the overall health status of your workloads on the cloud so you can quickly learn of unhandled risks and their threats to your assets.

    The lower the security score, the greater the overall asset security risk.

  • Security Monitoring: You can view how many threats, vulnerabilities, and compliance violations that are not handled and view their details.
  • Security Scores over the Time: You can view the trend of the asset health scores for the last seven days.

Large Screen

SecMaster leverages AI to analyze and classify massive cloud security data and then displays real-time results on a large screen. In a simple, intuitive, and efficient way, you will learn of what risks your cloud environment are facing and how secure your cloud environment is.

NOTE:

The large screen function needs to be applied for separately.

Security Reports

You can generate analysis reports and periodically send them to specified recipients by email. In this way, all recipients can learn about the security status of your assets in a timely manner.

Task Center

All tasks that need to be processed are displayed centrally.

Resource Manager

Resource Manager supports centralized management of assets on the cloud and assets outside the cloud and displays their security status in real time.

Table 6 Functions

Function Module

Description

Resource Manager

SecMaster can synchronize the security statistics of all resources. So that you can check the name, service, and security status of a resource to quickly locate security risks.

Risk Prevention

Risk prevention provides baseline check and vulnerability management functions to help you check cloud security configurations in accordance with many security standards. You will know where vulnerabilities are located in the entire environment.

Table 7 Functions

Function Module

Description

Baseline Inspection

SecMaster can scan cloud baseline configurations to find out unsafe settings, report alerts for incidents, and offer hardening suggestions to you.

Vulnerabilities

SecMaster automatically synchronizes vulnerability scan result from Host Security Service (HSS), displays vulnerability scan details by category, and provides vulnerability fixing suggestions.

Security Policies

SecMaster supports centralized management of defense and emergency policies.

Threat Operations

SecMaster provides many threat detection models in the Threat Operations module to help customers detect threats from massive security logs and generate alerts. Beyond that, it provides built-in security response playbooks to help automatically analyze and handle alerts, and automatically harden security defense lines and security configurations.

Table 8 Functions

Function Module

Description

Incidents

SecMaster centrally displays incident details and allows you to manually or automatically convert alerts into incidents.

Alerts

This module provides unified data class (security operations objects) management and built-in alert reporting standards. Alerts of other cloud services such as HSS, WAF, and DDoS Mitigation are integrated and centrally displayed.

Indicators

This module provides unified data class (security operation objects) management and built-in threat intelligence indicator library. Security indicators from other cloud services can be accessed, and custom rules for extracting indicators are supported.

Intelligent Modeling

Models are supported to scan log data in pipelines. If SecMaster detects data that hits the trigger in a model, SecMaster generates an alert.

Security Analysis

  • Query and analysis
    • Search and analysis: Supports quick data search and analysis, quick filtering of security data for security survey, and quick locating of key data.
    • Statistics filtering: SecMaster supports quick analysis and statistics of data fields and quick data filtering based on the analysis result. Time series data supports statistics collection by default time partition, allowing data volume trend to be quickly spotted. SecMaster supports analysis, statistics, and sorting functions, and supports quick building of security analysis models.
    • Visualization: Data analysis is visualized to intuitively reflect service structure and trend, so that you can create custom analysis reports and analysis indicators easily.
  • Data delivery: SecMaster can deliver data to other pipelines or other cloud products in real time so that you can store data or consume data with other systems.
  • Data monitoring: SecMaster supports end-to-end data traffic monitoring and management.
  • Data consumption: SecMaster provides streaming communication interfaces for data consumption and production and data pipelines that are integrated in SDKs. You can use SDKs to integrate data across systems and customize data consumers and producers. SecMaster provides open-source log collection plug-in Logstash. You can enable custom data consumers and producers.
NOTE:

You need to apply for the security analysis function separately.

Security Orchestration

Security Orchestration supports playbook management, process management, data class management (security entity objects), and asset connection management. You can also customize playbooks and processes.

Security Orchestration allows you to flexibly orchestrate security response playbooks through drag-and-drop according to your service requirements. You can also flexibly extend and define security operation objects and interfaces.

Table 9 Functions

Function Module

Description

Objects

This module helps centrally manage operation objects such as data classes, data class types, and categorical mappings.

Playbooks

This module supports full lifecycle management of playbooks, workflows, asset connections, and instances.

Layouts

This module provides a visualized low-code development platform. In this module, you can create custom layout of pages for security analysis reports, alert management, incident management, vulnerability management, baseline management, and threat indicator library management.

NOTE:

You need to separately apply for the security orchestration function in the value-added package.

Plugins

Plug-ins used in the security orchestration process can be managed centrally.

Data Collection

Collects varied log data in multiple modes. After data is collected, historical data analysis and comparison, data association analysis, and unknown threat discovery can be quickly implemented.

Table 10 Functions

Function Module

Description

Data Collection

(Collections and Components)

Logstash is used to collect varied log data in multiple modes. After data is collected, historical data analysis and comparison, data association analysis, and unknown threat discovery can be quickly implemented.

Data Integration

Integrates security ecosystem products for associated operations or data interconnection. After the integration, you can search for and analyze all collected logs.

Table 11 Functions

Function Module

Description

Data Integration

SecMaster provides a preset log collection system. You can enable access to logs of other cloud services in just a few clicks. You can search and analyze all collected logs in SecMaster.

Directory Customization

You can customize directories as needed.

Table 12 Functions

Function Module

Description

Directory Customization

You can view in-use directories and change their layouts.

Sitemizi ve deneyiminizi iyileştirmek için çerezleri kullanırız. Sitemizde tarama yapmaya devam ederek çerez politikamızı kabul etmiş olursunuz. Daha fazla bilgi edinin

Feedback

Feedback

Feedback

0/500

Selected Content

Submit selected content with the feedback