Skip to content

Commit

Permalink
Updates and single-sources Benchmarks page (#336)
Browse files Browse the repository at this point in the history
  • Loading branch information
benironside authored Apr 26, 2024
1 parent 34ac1a3 commit 368ce14
Show file tree
Hide file tree
Showing 4 changed files with 17 additions and 50 deletions.
24 changes: 16 additions & 8 deletions docs/cloud-native-security/benchmark-rules.mdx
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
---
id: serverlessSecurityBenchmarkRules
slug: /serverless/security/benchmark-rules
title: Benchmark rules
title: Benchmarks
description: Review the cloud security benchmark rules used by the CSPM and KSPM integrations.
tags: [ 'serverless', 'security', 'overview', 'cloud security' ]
status: in review
Expand All @@ -10,9 +10,12 @@ status: in review
<DocBadge template="technical preview" />
<div id="benchmark-rules"></div>

The Benchmark Integrations page lets you view the cloud security posture (CSP) benchmark rules for the <DocLink id="serverlessSecurityCspm">Cloud security posture management</DocLink> (CSPM) and <DocLink id="serverlessSecurityKspm">Kubernetes security posture management</DocLink> (KSPM) integrations.
The Benchmarks page lets you view the cloud security posture (CSP) benchmarks for the <DocLink id="serverlessSecurityCspm">Cloud security posture management</DocLink> (CSPM) and <DocLink id="serverlessSecurityKspm">Kubernetes security posture management</DocLink> (KSPM) integrations.

Benchmark rules are used by these integrations to identify configuration risks in your cloud infrastructure. Benchmark rules are based on the Center for Internet Security's (CIS) [secure configuration benchmarks](https://www.cisecurity.org/cis-benchmarks/).
![Benchmark rules page](../images/benchmark-rules/-cloud-native-security-benchmark-rules.png)

## What are benchmarks?
Each benchmark contains benchmark rules which are used by the CSPM and KSPM integrations to identify configuration risks in your cloud infrastructure. There are different benchmarks for different cloud services, such as AWS, GCP, or Azure. They are based on the Center for Internet Security's (CIS) [secure configuration benchmarks](https://www.cisecurity.org/cis-benchmarks/).

Each benchmark rule checks to see if a specific type of resource is configured according to a CIS Benchmark. The names of rules describe what they check, for example:

Expand All @@ -23,19 +26,24 @@ Each benchmark rule checks to see if a specific type of resource is configured a

When benchmark rules are evaluated, the resulting <DocLink id="serverlessSecurityCspmFindingsPage">findings</DocLink> data appears on the <DocLink id="serverlessSecurityCloudPostureDashboard">Cloud Security Posture dashboard</DocLink>.

To find the Benchmark Integrations page, go to **Rules → Benchmark rules**. From there, you can view the benchmark rules associated with an existing integration by clicking the integration name.
<DocCallOut title="Note">
Benchmark rules are not editable.
</DocCallOut>

![Benchmark rules page](../images/benchmark-rules/-cloud-native-security-benchmark-rules.png)
## Review your benchmarks

To access your active benchmarks, go to **Rules -> Benchmarks**. From there, you can click a benchmark's name to view the benchmark rules associated with it. You can click a benchmark rule's name to see details including information about how to remediate it, and related links.

You can then click on a benchmark rule's name to see details, including information about how to remediate failures and related links.
Benchmark rules are enabled by default, but you can disable some of them — at the benchmark level — to suit your environment. This means for example that if you have two CSPM integrations using the `CIS AWS` benchmark, disabling a rule for that benchmark affects both integrations. To enable or disable a rule, use the **Enabled** toggle on the right of the rules table.

<DocCallOut title="Note">
Benchmark rules are not editable.
Disabling a benchmark rule automatically disables any associated detection rules and alerts. Re-enabling a benchmark rule **does not** automatically re-enable them.
</DocCallOut>


## How benchmark rules work

1. When a security posture management integration is deployed, and every four hours after that, ((agent)) fetches relevant cloud resources.
1. After resources are fetched, they are evaluated against all applicable benchmark rules.
1. After resources are fetched, they are evaluated against all applicable enabled benchmark rules.
1. Finding values of `pass` or `fail` indicate whether the standards defined by benchmark rules were met.

41 changes: 0 additions & 41 deletions docs/cloud-native-security/cspm-benchmark-rules.mdx

This file was deleted.

Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
2 changes: 1 addition & 1 deletion serverless-security.docnav.json
Original file line number Diff line number Diff line change
Expand Up @@ -134,7 +134,7 @@
"classic-sources": [ "enSecurityCspmFindingsPage" ]
},
{
"id": "serverlessSecurityCspmBenchmarkRules",
"id": "serverlessSecurityBenchmarkRules",
"classic-sources": [ "enSecurityCspmBenchmarkRules" ]
},
{
Expand Down

0 comments on commit 368ce14

Please sign in to comment.