Qualys Cloudview User Guide

Total Page:16

File Type:pdf, Size:1020Kb

Qualys Cloudview User Guide CloudView User Guide September 20, 2021 Copyright 2019-2021 by Qualys, Inc. All Rights Reserved. Qualys and the Qualys logo are registered trademarks of Qualys, Inc. All other trademarks are the property of their respective owners. Qualys, Inc. 919 E Hillsdale Blvd 4th Floor Foster City, CA 94404 1 (650) 801 6100 Table of Contents About this Guide ............................................................................................... 7 About Qualys ........................................................................................................................... 7 Qualys Support ........................................................................................................................ 7 CloudView Overview ....................................................................................... 8 Qualys Subscription and Modules required ......................................................................... 8 Concepts and Terminologies .................................................................................................. 9 Get Started ....................................................................................................... 10 AWS ......................................................................................................................................... 10 Steps to Create AWS Connector .................................................................................... 10 Base Account ...................................................................................................................16 Base Account Configuration in AWS Console .............................................................. 18 Permissions for Fargate Profile ...................................................................................... 19 Create Custom Policy ...................................................................................................... 21 Editing AWS Connectors ................................................................................................ 22 AWS Resource Inventory ................................................................................................ 23 Microsoft Azure ..................................................................................................................... 25 Pre-requisites ................................................................................................................... 25 Steps to Create Azure Connector .................................................................................. 26 Configuration Steps on Microsoft Azure console ........................................................ 28 Editing Microsoft Azure Connectors ............................................................................. 36 Azure Resource Inventory .............................................................................................. 36 Google Cloud Platform ..........................................................................................................38 Steps to Create GCP Connector ..................................................................................... 38 Assign Service Account to other projects ..................................................................... 43 Editing GCP Connectors .................................................................................................. 44 GCP Resource Inventory ................................................................................................. 44 Enable-Disable Connectors .................................................................................................. 45 Disable Connector ........................................................................................................... 45 Enable Connector ............................................................................................................ 45 Managing Connector Access for Users......................................................47 User Permissions ................................................................................................................... 47 New Users: Scope and Permissions ..................................................................................... 48 Create User ...................................................................................................................... 48 Assign Role to Users ........................................................................................................ 49 Manage Access for Users (Grouping Connectors) ........................................................ 50 Manage Access for Users ................................................................................................ 52 Defining Scope for Existing Users ........................................................................................ 54 Sub User (All Privileges) ........................................................................................................ 55 Verity Confidential Sub User (Reader Privileges) ................................................................................................. 58 Securing Cloud Resources........................................................................... 60 Unified Dashboard ................................................................................................................. 60 Resources Details ................................................................................................................... 60 Instance Details ...............................................................................................................62 Vulnerability Details for Instances ............................................................................... 62 Drill down to Vulnerability Details for Instances (only for AWS) .............................. 65 View Security Group Information ................................................................................. 66 Resources Misconfigurations ................................................................................................ 68 Search Using Resource Parameter Information .......................................................... 72 Search Policy Controls .................................................................................................... 73 Exceptions .............................................................................................................................. 76 Create Exception ............................................................................................................. 76 View Exceptions .............................................................................................................. 82 Edit Exceptions? .............................................................................................................. 82 Delete exceptions? .......................................................................................................... 83 Exception History ............................................................................................................ 83 Exception Status .............................................................................................................. 83 Policies and Controls .....................................................................................85 Customize Controls ............................................................................................................... 85 Control Criticality ............................................................................................................85 System Controls .............................................................................................................. 87 User-Defined Controls .................................................................................................... 87 Copy Control and Customize ......................................................................................... 87 Build Your Own Policy ........................................................................................................... 89 System Defined Policy .................................................................................................... 89 Set Up Your Own Policy (Custom Policy) ...................................................................... 89 Policy Search .................................................................................................................... 91 Associating Controls ....................................................................................................... 91 Reports..............................................................................................................92 Assessment Reports .............................................................................................................. 92 On-Screen Reports ................................................................................................................. 95 Mandate Based Reporting ............................................................................................... 95 Policy Based Report ......................................................................................................... 99 List of Mandates ............................................................................................................ 102 Responses.......................................................................................................104 Configure Rule-based Alerts
Recommended publications
  • Securing Microsoft Azure with Qualys
    Securing Microsoft Azure with Qualys July 28, 2021 Verity Confidential Copyright 2020-2021 by Qualys, Inc. All Rights Reserved. Qualys and the Qualys logo are registered trademarks of Qualys, Inc. All other trademarks are the property of their respective owners. Qualys, Inc. 919 E Hillsdale Blvd 4th Floor Foster City, CA 94404 1 (650) 801 6100 Table of Contents About This Guide ............................................................................................. 5 About Qualys ........................................................................................................................... 5 Qualys Support ........................................................................................................................ 5 Introduction....................................................................................................... 6 Qualys Integrated Security Platform..................................................................................... 6 Pre-requisites ........................................................................................................................... 7 Automate Asset Inventory............................................................................. 9 Deploying Azure Connector ................................................................................................... 9 Pre-requisites..................................................................................................................... 9 Creating Azure Connector with AssetView.................................................................
    [Show full text]
  • Securing Amazon Web Services with Qualys
    Securing Amazon Web Services with Qualys July 28, 2021 Verity Confidential Copyright 2017-2021 by Qualys, Inc. All Rights Reserved. Qualys and the Qualys logo are registered trademarks of Qualys, Inc. All other trademarks are the property of their respective owners. Qualys, Inc. 919 E Hillsdale Blvd 4th Floor Foster City, CA 94404 1 (650) 801 6100 Table of Contents About this guide............................................................................................... 5 About Qualys ........................................................................................................................... 5 Qualys Support ........................................................................................................................ 5 Introduction....................................................................................................... 6 Qualys Integrated Security Platform..................................................................................... 6 Pre-requisites ........................................................................................................................... 8 Automate Asset Inventory........................................................................... 10 Setting up EC2 Connector..................................................................................................... 10 Cross-Account Role Authentication for EC2 Connectors ........................................... 10 ARN authentication .......................................................................................................
    [Show full text]
  • One Stack to Consolidate Traditional Enterprise Security and Compliance Solutions and Secure the Digital Transformation White Paper | Qualys Cloud Platform
    Qualys Cloud Platform One stack to consolidate traditional enterprise security and compliance solutions and secure the digital transformation White paper | Qualys Cloud Platform Table of Contents Introduction 3 The modern IT environment: borderless, distributed, elastic 4 Hybrid IT: A security challenge Snapshot 5 The new boundaries of your IT landscape 6 How can you monitor and protect this far-reaching environment? 7 Qualys Cloud Platform 8 Introduction 9 Overview of the Qualys Cloud Platform 9 The ideal architecture for securing digital transformation initiatives 10 How it operates 12 Versatile set of sensors 13 Qualys appliances 14 Passive Network Sensor 15 Qualys Cloud Agent 16 Qualys Cloud Apps 17 Back-end data categorization, visualization and analysis 22 Advantages of our cloud-based architecture 24 Our apps and services are delivered either via our public cloud platform, 25 or private cloud platform Qualys Subscriptions 27 SMB, mid-size, enterprise, consultant and MSPs, government 27 Community Edition 30 Comprehensive training and support 31 Customers 32 Customer base 33 Geisinger Health Systems 34 Synovus Financial Corp 35 The future 36 A peek at what's coming 37 2 White paper | Qualys Cloud Platform Introduction “Qualys helps us to make sure that As organizations digitally transform business processes our network is secure and that to boost agility and efficiency, IT environments become distributed, elastic and hybrid — a challenge for security our systems, and those of our teams. CISOs are no longer well served by conventional customers, are hardened as well.” security products designed to protect traditional, well- defined corporate perimeters where most assets are on Senior Manager, premises.
    [Show full text]
  • Leveraging Continuous Visibility to Secure Global IT Assets for the Digital Transformation
    Leveraging Continuous Visibility to Secure Global IT Assets for the Digital Transformation FEATURING RESEARCH FROM FORRESTER Vendor Landscape: Vulnerability Management, 2017 2 An Introduction To The Forrester Vendor Landscape: Vulnerabilty Management, 2017 CONTINUOUS VISIBILITY IS KEY TO SECURING TODAY’S ENTERPRISE The widespread adoption of cloud computing services and mobile devices has drastically changed enterprise information security. Organizations are no longer well served by the conventional approach IN THIS of protecting the traditional corporate perimeter, whose boundaries consisted primarily of desktop DOCUMENT PCs sitting inside offices and servers humming in on-premises data centers. Today, organizations live in a perimeter-less world. Those clearly defined physical boundaries in which their IT infrastructure 1 Leveraging was housed have been pushed out, blurred, transformed and in some cases even erased. Continuous Visibility to Secure Adoption of cloud computing software, platform and infrastructure services -- SaaS, PaaS and Global IT Assets for the Digital IaaS -- continues on the upswing among organizations of all sizes globally as they digitally Transformation transform. Workloads shift from on-premises systems to public, private and hybrid clouds, requirements for asset discovery, security and compliance change significantly, both from security 5 Vendor Landscape: and compliance perspectives. Vulnerability Management, 2017 This shift to virtualized, ephemeral and ever-growing infrastructure changes the size and nature of attack surfaces. If an organization’s most critical vulnerabilities are patched across these assets, it 19 About Qualys greatly increases its protection against attacks that may get through the firewall, such as viruses that arrive via email. To protect against these critical threats, the challenge is effectively immunizing IT assets across an increasingly diverse and widespread landscape of assets: on-premises data centers, public cloud platforms and endpoints.
    [Show full text]
  • Qualys Malware Detection API User Guide
    Malware Detection API User Guide February 16, 2021 Copyright 2016-2021 by Qualys, Inc. All Rights Reserved. Qualys and the Qualys logo are registered trademarks of Qualys, Inc. All other trademarks are the property of their respective owners. Qualys, Inc. 919 E Hillsdale Blvd 4th Floor Foster City, CA 94404 1 (650) 801 6100 Preface Chapter 1 Welcome Get Started .......................................................................................................................... 7 Get API Notifications........................................................................................................ 7 MD API Framework.......................................................................................................... 8 Base URL to the Qualys API Server......................................................................... 8 XML Output and Schemas ............................................................................................... 9 Introduction to MD API Paradigm ............................................................................... 10 Know your Portal Version.............................................................................................. 14 Chapter 2 MD API Search malware detections............................................................................................. 18 View details of a malware detection............................................................................. 21 Current malware detection count ................................................................................
    [Show full text]
  • Securing Google Cloud Platform with Qualys
    Securing Google Cloud Platform with Qualys July 28, 2021 Verity Confidential Copyright 2021 by Qualys, Inc. All Rights Reserved. Qualys and the Qualys logo are registered trademarks of Qualys, Inc. All other trademarks are the property of their respective owners. Qualys, Inc. 919 E Hillsdale Blvd 4th Floor Foster City, CA 94404 1 (650) 801 6100 Table of Contents About this guide................................................................................................ 5 About Qualys ........................................................................................................................... 5 Qualys Support ........................................................................................................................ 5 Introduction........................................................................................................6 Qualys Cloud Platform ............................................................................................................ 6 Prerequisites ............................................................................................................................. 7 Scanning in GCP Environments ................................................................... 10 Networking Basics ................................................................................................................. 10 Use Cases for Scanning GCP environment ......................................................................... 10 Deploying Sensors...........................................................................................17
    [Show full text]
  • Secure Enterprise Mobility User Guide Version 1.1
    Secure Enterprise Mobility User Guide Version 1.1 July 25, 2021 Verity Confidential Copyright 2021 by Qualys, Inc. All Rights Reserved. Qualys and the Qualys logo are registered trademarks of Qualys, Inc. All other trademarks are the property of their respective owners. Qualys, Inc. 919 E Hillsdale Blvd 4th Floor Foster City, CA 94404 1 (650) 801 6100 Table of Contents About this guide................................................................................................4 About Qualys ........................................................................................................................... 4 Qualys Support ........................................................................................................................ 4 Get Started ......................................................................................................... 5 Configurations ...................................................................................................6 EULA Management .................................................................................................................. 6 APNs Certificates ..................................................................................................................... 8 What is an APNs Certificate? ........................................................................................... 8 Pre-requisites to Generate the Certificate ...................................................................... 8 Steps to Generate APNs Certificate ................................................................................
    [Show full text]