Integrating
Cloud Security and Compliance
Provides a lightweight, agentless method of collecting the following data sources, enabling the resultant Lacework Feature(s).
| Use Cases | Lacework Feature(s) | Data Source |
|---|---|---|
| Cloud Security Posture Management (CSPM) Cloud Infrastructure Entitilement Management (CIEM) | Compliance Dashboard and Reports Cloud Infrastructure Entitilement Management Dashboard Attack Path Analysis and Exposure Polygraph | AWS Cloud Configuration Google Cloud Configuration Azure Cloud Configuration |
| User Entity Behaviour Analytics (UEBA) | Cloud Anomaly Detection Cloud Drift Detection Cloud Audit Polygraph | AWS Cloud Audit Logs Google Cloud Audit Logs Azure Cloud Audit Logs |
| Vulnerability Management | Container Vulnerability Management | ECR GCR GAR ACR AWS Agentless Workload Scanning Google Cloud Agentless Workload Scanning |
| User Entity Behaviour Analytics (UEBA) | Kubernetes Audit Log Dashboard Kubernetes Anomaly Detection Kubernetes Audit Log Polygraph | EKS Audit GKE Audit |
Workload Visibility and Security
Provides workload level data collection visibility, enabling the resultant Lacework Feature(s):
| Use Cases | Lacework Feature(s) | Data Source |
|---|---|---|
| User and Entity Behavior Analytics (UEBA) | Workload Anomaly Detection Process Dashboard and Polygraph Network Dashboard and Polygraph Filesystem Dashboard and Polygraph | Linux Agent Windows Agent Kubernetes Agent |
| Vulnerability Management | Host Vulnerability Management (with Active Vulnerability Detection) Container Vulnerability Management | Linux Agent Kubernetes Agent Kubernetes Admission Contoller |
| Kubernetes Posture Management (KSPM) | Kubernetes Compliance Dashboard and Reports | EKS Compliance |
Next Steps
Follow the links below to learn more and get started with your Lacework deployment.