Skip to main content

Integrating

Cloud Security and Compliance

Provides a lightweight, agentless method of collecting the following data sources, enabling the resultant Lacework Feature(s).

Use CasesLacework Feature(s)Data Source
Cloud Security Posture Management (CSPM)
Cloud Infrastructure Entitilement Management (CIEM)
Compliance Dashboard and Reports
Cloud Infrastructure Entitilement Management Dashboard
Attack Path Analysis and Exposure Polygraph
AWS Cloud Configuration
Google Cloud Configuration
Azure Cloud Configuration
User Entity Behaviour Analytics (UEBA)Cloud Anomaly Detection
Cloud Drift Detection
Cloud Audit Polygraph
AWS Cloud Audit Logs
Google Cloud Audit Logs
Azure Cloud Audit Logs
Vulnerability ManagementContainer Vulnerability ManagementECR
GCR
GAR
ACR
AWS Agentless Workload Scanning
Google Cloud Agentless Workload Scanning
User Entity Behaviour Analytics (UEBA)Kubernetes Audit Log Dashboard
Kubernetes Anomaly Detection
Kubernetes Audit Log Polygraph
EKS Audit
GKE Audit

Workload Visibility and Security

Provides workload level data collection visibility, enabling the resultant Lacework Feature(s):

Use CasesLacework Feature(s)Data Source
User and Entity Behavior Analytics (UEBA)Workload Anomaly Detection
Process Dashboard and Polygraph
Network Dashboard and Polygraph
Filesystem Dashboard and Polygraph
Linux Agent
Windows Agent
Kubernetes Agent
Vulnerability ManagementHost Vulnerability Management (with Active Vulnerability Detection)
Container Vulnerability Management
Linux Agent
Kubernetes Agent
Kubernetes Admission Contoller
Kubernetes Posture Management (KSPM)Kubernetes Compliance Dashboard and ReportsEKS Compliance

Next Steps

Follow the links below to learn more and get started with your Lacework deployment.