Deployment Planning
Developing a plan for your deployment will help ensure you're covering all of your security bases with Lacework. In the following sections we will review each of the deployment focus areas and outline what you'll need to know to get started:
Cloud Security and Compliance
Provides a lightweight, agentless method of collecting the following data sources, enabling the resultant Lacework Feature(s).
| Use Cases | Lacework Feature(s) | Data Source |
|---|---|---|
| Cloud Security Posture Management (CSPM) Cloud Infrastructure Entitilement Management (CIEM) | Compliance Dashboard and Reports Cloud Infrastructure Entitilement Management Dashboard Attack Path Analysis and Exposure Polygraph | AWS Cloud Configuration Google Cloud Configuration Azure Cloud Configuration |
| User Entity Behaviour Analytics (UEBA) | Cloud Anomaly Detection Cloud Drift Detection Cloud Audit Polygraph | AWS Cloud Audit Logs Google Cloud Audit Logs Azure Cloud Audit Logs |
| Vulnerability Management | Vulnerability Management Dashboard | ECR GCR GAR ACR AWS Agentless Workload Scanning Google Cloud Agentless Workload Scanning |
| User Entity Behaviour Analytics (UEBA) | Kubernetes Audit Log Dashboard Kubernetes Anomaly Detection Kubernetes Audit Log Polygraph | EKS Audit GKE Audit |
Workload Visibility and Security
Provides workload level data collection visibility, enabling the resultant Lacework Feature(s):
| Use Cases | Lacework Feature(s) | Data Source |
|---|---|---|
| User and Entity Behavior Analytics (UEBA) | Workload Anomaly Detection Process Dashboard and Polygraph Network Dashboard and Polygraph Filesystem Dashboard and Polygraph | Linux Agent Windows Agent Kubernetes Agent |
| Vulnerability Management | Vulnerability Management Dashboard (including Active Vulnerability Detection) | Linux Agent Kubernetes Agent Kubernetes Admission Contoller |
| Kubernetes Posture Management (KSPM) | Kubernetes Compliance Dashboard and Reports | EKS Compliance |
Next Steps
Follow the links below to learn more and get started with your Lacework deployment planning.