FAQ

A List of Common Questions and Answers around InsightCloudSec

General

What is InsightCloudSec?

InsightCloudSec (previously DivvyCloud) is a fully-integrated cloud-native security platform (CNSP) that enables organizations to drive cloud security forward through continuous security and compliance.

InsightCloudSec helps teams protect even the most complex multi-cloud and container environments from misconfiguration, policy violations, threats, and identity and access management (IAM) challenges. The solution features automated, real-time remediation to help customers quickly respond to security and compliance risks.

What is a CNSP?

A CNSP, like InsightCloudSec, is a fully-integrated cloud-native security platform—your whole cloud security toolbox in a single solution. InsightCloudSec provides standardized visibility for multiple clouds to enable a single policy and a single automation strategy to detect and remediate risk. We can provide event-driven harvesting to identify change in real time and assess risk in 60 seconds.

  • Sign up for a demo to learn more.

What are some of the problems InsightCloudSec solves?

InsightCloudSec helps teams protect even the most complex multi-cloud and container environments from misconfigurations, policy violations, threats, and identity and access management (IAM) challenges. The solution features automated, real-time remediation in order to help customers more quickly respond to security or compliance risks.

Read more about our key features , our product capabilities, or check out some case studies.

Product Architecture, Deployment & Configuration

What deployment options do you offer?

InsightCloudSec is available to customers in the following deployment models:

  • Self-Hosted: Deployed and managed by you in your environment
  • Managed Self-Hosted: Deployed in your environment and managed by InsightCloudSec
  • Software-as-a-Service (SaaS): Deployed and managed by InsightCloudSec in our environment

Check out the details below:

What is required to run InsightCloudSec?

InsightCloudSec uses several basic components: a database, Redis (a data-structure store), three compute nodes (for its workers), a load balancer, and network resources for connecting back to the internet. It runs on Ubuntu and CentOS variants. And for most enterprise deployments we recommend at least two instances of InsightCloudSec, each with at least the following:

  • 4 cores
  • 8 GB of memory
  • 30 GB root volume

Check out the Product Architecture page for additional details.

What cloud service providers are supported?

InsightCloudSec includes support for:

  • Amazon Web Services, including AWS GovCloud and AWS China
  • Microsoft Azure, including Azure GovCloud and Azure China
  • Google Cloud Platform
  • Alibaba Cloud (Ali Cloud)
  • Oracle Cloud Infrastructure

We also support Amazon Elastic Container Service for Kubernetes (Amazon
EKS), Azure Kubernetes Service (AKS), Google Kubernetes Engine (GKE), and Kubernetes.

If you don't see your cloud provider listed here, reach out to us through the Customer Support Portal.

What compliance standards are supported?

InsightCloudSec enables organizations to evaluate compliance with hundreds of out-of-the-box policies that map to compliance and industry standards, including PCI DSS, HIPAA, GDPR, SOC 2, ISO 27001, CIS Benchmarks for AWS, GCP, Azure, Kubernetes, NIST CSF, NIST 800-53, FedRAMP CCM, and CSA CCM. Click to learn more about our out-of-the-box Compliance Packs.

What third-party integrations does InsightCloudSec support?

InsightCloudSec includes Integrations with a number of tools for inbound functionality (data aggregation and data collection), and outbound for things like notifications and ticketing. Integrations include InsightIDR, InsightVM, Slack, PagerDuty, ServiceNow, Splunk, Jira, Tenable.io, Microsoft Teams, and Jinja2.

How are InsightCloudSec permissions managed?

While access to cloud resources is managed through the respective Cloud Service Providers (CSPs) (e.g. roles, IAM, users), access to capabilities within InsightCloudSec rely on entitlements.

Check out our documentation on Users, Groups, and Roles (Administration), Permissions Entitlements, and our handy User Entitlements Matrix for details.


Did this page help you?