Cloud security posture management (CSPM) offers a cloud service configuration check feature that detects configuration issues and security risks based on check rules from AI Settings (AI-SPM), Kubernetes Security Posture Management (KSPM), Cloud Infrastructure Entitlements Management (CIEM), best security practices from cloud providers, and compliance standards. It assesses risks and displays statistics by risk level to provide an overview of configuration risks for cloud services.
Limit
This feature is available for both free and paid editions of Security Center.
Billing
Security Center offers some check items for free. For paid check items, charges are based on the quota usage for each instance, which includes the number of scans, verifications, and fixes. For more information, see CSPM billing.
Procedure
Authorize Security Center to access your resources and activate CSPM for full check item usage in configuration check.
NoteTo use only the free check items from Security Center, complete the authorization.
Add multi-cloud assets requiring configuration checks to Security Center.
Security Center automatically synchronizes cloud services under the same Alibaba Cloud account. No manual operation is needed.
Configure check policies to assess configuration risks in specific cloud services, perform periodic checks, or whitelist certain check items for an instance to skip.
Manually perform a full scan or a policy-based scan. Security Center also conducts automatic scans based on the check cycle and time specified in the scan policies.
View details of failed check items, including descriptions, at-risk assets, and recommended solutions.
Fix the configuration of at-risk assets based on the solutions and verify that the failed check item has passed after the fix.
Function descriptions
Check rules
Configuration check supports check rules for AI-SPM, KSPM, CIEM, security risks, and compliance risks. See the table below for specific predefined check items provided by Security Center. You can also add custom check items in these scenarios.
For specific predefined check items supported, see the
page in the Security Center console.Scenario | Check item category | Description |
AI-SPM | Alibaba Cloud AI security practices: Platform for AI (PAI) |
|
KSPM | K8s best security practices: container security, security policies, RBAC, and storage policies. |
|
CIEM | AWS Identity and Access Management (IAM): IAM identity authentication and IAM permission management. |
|
Tencent Cloud Access Management (CAM): CAM identity authentication and CAM permission management. | ||
Alibaba Cloud identity and permission management: RAM identity authentication, IDAAS, and RAM permission management. | ||
Security risks | Alibaba Cloud best security practices: security, NoSQL database, storage, elastic computing, relational database, data warehouse, container and middleware, network, big data, DevOps and maintenance, and database management tools. |
|
AWS best security practices: computing, database, analytics, storage, networking and content delivery, and container. | ||
Azure best security practices: network, computing, container, storage, database, security, and monitor. | ||
Tencent Cloud best security practices: network, relational database, NoSQL database, storage, container and middleware, big data, security, and computing. | ||
Huawei Cloud: management and monitoring. | ||
Compliance risks | Internationally agreed best practices for security: Alibaba Cloud platform baseline and AWS platform baseline. |
|
PCI Data Security Standard: Alibaba Cloud PCI DSS. |
| |
Classified Protection 2.0 Standard: Alibaba Cloud Multi-Level Protection Scheme (MLPS) Level 3. |
| |
ISO international standard: Alibaba Cloud ISO 27001. |
|
Risk levels
CSPM assesses risks mainly based on the severity and application scenarios.
Risk level | Description | Fix suggestion |
High | Items that significantly increase intrusion or exposure risk, such as management port exposure, origin server bypass, credential leakage, unauthorized access, authentication bypass, and undisabled privileged accounts. | Fix immediately. |
Medium | Important items that, if addressed, can reduce configuration vulnerabilities and enhance data security. | Address in a timely manner based on your situation. |
Low | Non-critical items, such as log audit reminders and security governance notifications. | Ignore or fix as needed for compliance. |
Fix risks
Security Center offers optimization suggestions and solutions for each risk item to help you manage cloud resources and ensure business security.
Individual fix: You need to assess the risk impact on the cloud services based on the check results, and perform fixes.
Batch fix: Security Center provides a one-click fix feature for more than 100 check items, enabling you to correct configurations of instances in the Security Center console.
You can view the risk items eligible for one-click fix in the console.
Each successful fix of a risk item consumes one quota of CSPM.
Supported cloud services
Security Center supports adding Alibaba Cloud services, third-party cloud services (Tencent Cloud, Huawei Cloud, Azure, and AWS), and self-managed K8s clusters, and checking cloud service configurations based on check rules. You can view the supported cloud services in the Security Center console.