Cloud & API Security

Cloud & API Security enables secure adoption of cloud technologies and APIs by managing risks, enforcing security controls, and safeguarding data across distributed environments.

CyTech AQUILA - Cloud Security Posture Management (CSPM)

Overview:

CSPM helps secure your cloud infrastructure by discovering and evaluating cloud services (e.g., storage, compute, IAM) against CIS benchmarks to identify and remediate configuration risks that may affect data confidentiality, integrity, and availability.

Key Features:

Pre-requisites

  1. Access to CyTech - AQUILA
    • Only users assigned the "Owner" or "Admin" role can access the Log Collector installation resources within the platform.

To navigate to CSPM Module please follow the instructions below:

Step 1: Log in to CyTech - AQUILA. click here --> usdc.cytechint.io
Step 2: Click on Cyber Monitoring.

Test (32).png

Step 3: Choose Cloud Security Posture Management (CSPM).

Test (33).png

Step 4: Hover into leftmost panel to view all the CSPM sections.

Test (34).png

Here in the CSPM Dashboard you can view all the evaluations. Such as Account Evaluated, Compliance Score, Compliance by Center in Internet Security (CIS), Findings and Posture Trends.

HEHE.png

  1. Account Evaluated: 
    • This refers to the specific cloud accounts that have been assessed for security compliance. An "account" in this context typically represents a collection of cloud resources under a single administrative domain within a cloud service provider (e.g., an AWS account, an Azure subscription). Evaluating an account involves checking its resources and configurations against security benchmarks.

      HEHE (1).png


  2. Compliance Score:
    • The compliance score is a metric that indicates how well a cloud account or resource adheres to predefined security benchmarks, such as those set by the Center for Internet Security (CIS). It is usually expressed as a percentage, with a higher score indicating better compliance. This score helps organizations quickly assess their security posture and identify areas needing improvement.

      HEHE (2).png

  3. Compliance by Center for Internet Security (CIS):

    • This refers to the evaluation of cloud resources against the security guidelines and best practices defined by the CIS benchmarks. These benchmarks provide a set of controls and recommendations to secure cloud environments. Compliance by CIS helps organizations ensure their configurations align with industry standards for security.

      HEHE (3).png

  4. Findings:
    • Findings are the results of the security assessments conducted by the CSPM module. They detail specific issues or misconfigurations identified during the evaluation process. Each finding typically includes information about the affected resource, the nature of the issue, its severity, and recommended remediation steps.

      HEHE (4).png

  5. Posture Trends:
    • Posture trends refer to the analysis of changes in security posture over time. This involves tracking improvements or regressions in compliance scores and findings. Understanding posture trends helps organizations identify patterns, measure the effectiveness of their security initiatives, and make informed decisions about future security strategies.

      HEHE (5).png

  6. Recent Findings:
    • In this section, a list of recent findings can be found below with their details. Such as Result, Resource ID, Rule Name, Cis Section, and Last Checked. 

      HEHE (6).png

In the Findings Dashboard - it shows you all the detailed misconfigurations evaluated by our CSPM Module. Here you view the Result, Resource ID, Resource Name, Resource Type, Rule Number, Rule Name, CIS Section, Last Checked and Cloud.

Misconfigurations

HEHE (5).png

Findings Tab

Lists of Findings


By clicking each of the misconfigurations image.png, it will show you all the details such as Evidence, Remediation and Rule Info.

Note: The image.png icon is only clickable on failed results, pressing on a successful result does not open a pop up window.

HEHE (6).png

In the evidence tab, it will give you the details of information that supports the misconfiguration.

HEHE (8).png

Remediation tab shows all the needed instructions to resolve the misconfigurations, and you can also "Add a Task" function.

HEHE (9).png

Rule info tab shows the full details such as Description, Rationale, and References.

HEHE (10).png

Task Management Section- Displays all tasks created to mitigate identified vulnerabilities from cloud security findings.

HEHE (11).png



Reports Section 

In this section, users can View and Manage their Test Report.

HEHE (12).png

The user can add new reports by pressing the "+ New Report Button". After providing the title for the report, it will automatically generate a report. 

HEHE (13).png

After setting up the report, the user can access it by pressing the "👁️" emoji. Users can also download it by pressing the download button at the top right of the pop-up window.

HEHE (14).png

Conclusion:

The Cloud Security Posture Management (CSPM) module monitors user-owned cloud applications to detect malicious behavior and identify risks from improper cloud service implementations. By continuously scanning cloud environments and providing real-time threat detection, the module ensures compliance with industry standards, identifies misconfigurations, and delivers actionable remediation guidance. This proactive approach helps organizations maintain a strong security posture, reduce vulnerabilities, and protect sensitive data across their entire cloud infrastructure.

              If you need further assistance, kindly contact our support at support@cytechint.com for prompt assistance and guidance.