This page describes the overview of the Cloud Security module. This module helps you to secure cloud-native applications based on real-time vulnerability analytics, and business risk observability. This is done by showing you potential business risk insights to better prioritize issues, respond to real-time security risks, and reduce organizational risk profiles.
Prerequisites
You must have the following:
Cloud Security can be deployed in any cloud environment that supports Kubernetes version >= 1.23.
Minimum Helm version 3.8.0, with OCI registry support.
Cluster must have at least three nodes.
K8s CLI (kubectl) installed on the machine or VM from which the deployment is run, with Admin permissions to the cluster.
DNS resolution and external access to these domains on port 443: 5 GB memory, 1.2 vCPU cores (total, for all nodes).
Kubernetes® cluster
At least one service is running on the Kubernetes cluster.
You have assigned the Security Configuration Manager role. This enables Kubernetes security monitoring.
Cloud Security Overview
When you click Cisco Secure Application, the Overview page displays these Cloud Security insights:
Business transaction overview:
Monitored business transactions: The total number of monitored business transactions.
Business transactions by business risk score: A chart that displays the total number of business risks with Normal, Warning, and Critical levels.
Business risk score histogram: A chart that displays the severity risk score, and the date and time of those scores.
Vulnerability overview:
Total vulnerabilities: The total number of scanned vulnerabilities.
Vulnerabilities by CVSS score: A chart the visualizes the vulnerabilities found and their CVSS score. This score is based on the Common Vulnerability Scoring System (CVSS) with five severities: None 0-0, Low 0.1-3.9, Medium4.0-6.9, High 7.0-8.9, Critical 9.0-10.0.
Vulnerability trend: A chart the visualizes the vulnerabilities found over a specific time range.
Top 5 vulnerabilities by Cisco Security Risk Score: The top vulnerabilities with the highest Cisco Security Risk Score. This score provides an estimate of exploitation based on real-time events. The three statuses include: Green 0-33, Amber 34-66, Red 67-100. pro estimate of exploitation based on real-time events. These are the three statuses: Green 0-33, Amber 34-66, Red 67-100.
Top 5 vulnerabilities by impacted container images: The top impacted container images.
Container security:
Pod distribution by misconfiguration: The total number of misconfigurations found for pods. You can also view if the misconfigurations are in a Normal state or Misconfigurations found state.
Workload distribution by misconfiguration: The total number of misconfigurations found for workloads. You can also view if the misconfigurations are in a Normal state or Misconfigurations found state.
Navigate Cloud Security
These pages show you where to view further Cloud Security metrics and information on Cisco Secure Application.