Skip to main content

Deployment Planning

Developing a plan for your deployment will help ensure you're covering all of your security bases with Lacework. In the following sections we will review each of the deployment focus areas and outline what you'll need to know to get started:

Cloud Security and Compliance

Provides a lightweight, agentless method of collecting the following data sources, enabling the resultant Lacework Feature(s).

Use CasesLacework Feature(s)Data Source
Cloud Security Posture Management (CSPM)
Cloud Infrastructure Entitilement Management (CIEM)
Compliance Dashboard and Reports
Cloud Infrastructure Entitilement Management Dashboard
Attack Path Analysis and Exposure Polygraph
AWS Cloud Configuration
Google Cloud Configuration
Azure Cloud Configuration
User Entity Behaviour Analytics (UEBA)Cloud Anomaly Detection
Cloud Drift Detection
Cloud Audit Polygraph
AWS Cloud Audit Logs
Google Cloud Audit Logs
Azure Cloud Audit Logs
Vulnerability ManagementVulnerability Management DashboardECR
GCR
GAR
ACR
AWS Agentless Workload Scanning
Google Cloud Agentless Workload Scanning
User Entity Behaviour Analytics (UEBA)Kubernetes Audit Log Dashboard
Kubernetes Anomaly Detection
Kubernetes Audit Log Polygraph
EKS Audit
GKE Audit

Workload Visibility and Security

Provides workload level data collection visibility, enabling the resultant Lacework Feature(s):

Use CasesLacework Feature(s)Data Source
User and Entity Behavior Analytics (UEBA)Workload Anomaly Detection
Process Dashboard and Polygraph
Network Dashboard and Polygraph
Filesystem Dashboard and Polygraph
Linux Agent
Windows Agent
Kubernetes Agent
Vulnerability ManagementVulnerability Management Dashboard (including Active Vulnerability Detection)Linux Agent
Kubernetes Agent
Kubernetes Admission Contoller
Kubernetes Posture Management (KSPM)Kubernetes Compliance Dashboard and ReportsEKS Compliance

Next Steps

Follow the links below to learn more and get started with your Lacework deployment planning.