This page provides a glossary of terminology with definitions for InsightCloudSec-specific terminology as well as some useful cloud-based terms.
“Application program interface, a set of functions and procedures allowing the creation of applications that access the features or data of an operating system, application, or other service.”
InsightCloudSec’s API can be used to create Insights and Bots, modify compliance packs, and perform other functions outside of the platform user interface. See the API documentation for details.
Amazon Web Services, Amazon’s cloud platform
A User with the highest level of privileges or authorizations. Admins generally will retain all permissions to read/view, write/edit, delete, etc. There are two types of Admins, Domain Admins and Org Admins. A Domain Admin can do everything in the tool. An Org Admin can do everything operational in their organization in the tool.
See also Domain Admin and Org Admin.
External Active Directory/LDAP (lightweight directory access protocol) servers for user authentication.
These servers can be connected and managed from the Authentication Servers tab of the Identity Management page.
Background Jobs are worker processes that run on a schedule to keep InsightCloudSec current (e.g., harvesting Insights) and optimized (e.g., OrphanedResourceCleanup). Background Jobs are distinct from On-Demand jobs in that they are not run immediately. Resource harvest jobs, which can be accessed via the Cloud details section, can be thought of as specialized Background Jobs.
A list of Background Jobs can be accessed from the Background Jobs tab on the System Administration page.
An internal ID for clouds. Badges are similar to Tags (key/value pairs applied to individual resources) but applied to entire cloud accounts.
Badges are used to scope Bot actions, report on compliance, bound searches, and otherwise customize the organization of cloud accounts.
An Insight pack used as the basis for creating a customized pack.
Bot (short for "robot") is an automated program that executes user-defined actions on resources according to user-defined conditions. Bots comprise a scope (bounds for which resources the Bot acts upon), filters (conditions upon which the Bot will act), and actions (what the Bot does).
The InsightCloudSec feature where the user creates Bots, defining the bots’ scope, conditions, and actions.
The combined practices of continuous integration (CI) and continuous deployment (CD) for developing software in a sustainable way.
A cloud, or cloud account, is an account for cloud services (storage, compute, etc.) from a cloud services provider (Cloud Provider), such as AWS, GCP, Azure, and other. You can have multiple accounts ("clouds") from a single provider, or you can use multiple providers to create your overall cloud infrastructure.
Conformity with industry requirements and standards for cloud-related security, cost, and other controls. Compliance across multiple cloud providers is a major focus of InsightCloudSec.
Compliance packs are collections of related insights pertinent to a specific compliance standard. Compliance packs may focus on security, costs, governance, or combinations of these across a variety of frameworks. Examples are NIST 800-53, ISO 27001, HIPAA, and PCI DSS. Compliance packs are accessed from the Compliance Packs tab on the Insights main page.
Visually summarizes cloud accounts’ adherence to specific rules or conditions of an Industry Standard, e.g., NIST 800-53 or ISO 27001. This summary is presented as a heat-map type visual; the Compliance Scorecard also provides guidance concerning actions to take on specific resources to mitigate failing issues. Check out more information - Compliance Scorecard.
Relative to EDH, a central account that ingests events from one or more Producers. See also Event-Driven Harvesting (AWS).
A Compliance Pack, customized for specific uses. Custom packs can be created from existing--or base--packs, and adding or removing specific Insights as desired. Custom Packs are found on the Custom Packs tab of the Insights main page.
A collection of strings of data definitions that can be used (and reused) in creating and updating Filters, Insights, and Bots.
A disabled resource is a resource that is not harvested. As such, InsightCloudSec will not surface permissions errors related to harvesting disabled resources.
DivvyCloud was a Cloud Security Posture Management (CSPM) platform that provides real time analysis and automated remediation across leading cloud and container technologies, including AWS, Azure, GCP, Alibaba, and Kubernetes.
As of July 2021, DivvyCloud by Rapid7 has been relaunched as a full CNSP called InsightCloudSec.
A User with the highest level of privileges or authorizations. A Domain Admin can do everything in the tool. There are also read-only Domain Admins who are able to view all resource data among all InsightCloudSec organizations, yet as the name implies, they are not able to make changes to InsightCloudSec. See also Admin.
Entitlements, or Permissions Entitlements, give domain users control over basic users' and organization admins' permissions to access certain parts of the tool. These entitlements are available for BotFactory, Tag Explorer, Insights, and Scheduled Events. The four possible permissions levels are "disabled", "viewer", "editor", and "admin". Entitlements are assigned independently to features, e.g., a basic user might be "disabled" for BotFactory but have "editor" permissions for Tag Explorer.
Event-Driven Harvesting (EDH)
Event-driven harvesting (EDH) is a data collection mechanism where events are pushed to InsightCloudSec instead of being collected via polling. AWS EDH leverages CloudTrail and CloudWatch events for collection. GCP EDH leverages StackDriver and Pub/Sub events for collection.
Relative to AWS EDH, event-driven roles are either Consumer or Producer.
A Resource Group that defines a collection of resources that are not evaluated against a specific Insight. For example, S3 buckets configured to host websites can be placed in a Resource Group called “Websites” that is then exempted from the Insight “Storage Container Exposed To The Public”.
An Insight that matched a scoped resource. In other words, a resource met the conditions of this Insight when a query was run.
Filters specify conditions InsightCloudSec searches for in identifying matching resources. An example filter: ‘Resource is not encrypted’.
Filters are used in Insights and Bots. Insights combine filters, scope, and reporting. Bots take action based on the output filters, scope, and insights.
Google Cloud Platform
Harvesting describes how InsightCloudSec collects data from the cloud providers:
A resource within the specified scope that matches a designated (searched-on) Insight. Impacted resources indicate violations on an Insight.
With respect to cloud computing, infrastructure refers to an enterprise's entire cloud-based or local collection of resources and services. This term is used synonymously with "cloud footprint".
An Insight describes a specific behavior, condition, or characteristic of a cloud resource. Insights are the checks—built on a combination of one or more filters and scopes—that are run on your infrastructure. They can be used to report on resources, or to instruct Bots as to which resources require actions. Some examples of common insights include:
Insights can be used individually or in packs.
InsightCloudSec (formerly DivvyCloud) is a fully-integrated cloud-native security platform (CNSP) that enables organizations to drive cloud security forward through continuous security & compliance.
With InsightCloudSec, Rapid7 is the first organization to bring together a single solution that integrates posture management, identity & access management, infrastructure-as-code, and Kubernetes protection to enable teams to safely speed up their cloud adoption without compromise.
A collection of Insights, usually focused on the same type of issue, e.g., security, compliance, governance.
A user-defined designation for the severity of an Insight. Severity levels are "Moderate", "Major", "Severe", and
Refers to a virtual server instance from a public or private cloud network.
External systems with which InsightCloudSec is designed to interface for both inbound (data aggregation, data collection) and outbound (notifications, ticketing) actions.
The number of harvest jobs that are enqueued and waiting on a worker node to process. Job backlogs can rise and fall. For example, adding clouds will cause the job backlog to rise as the initial cloud harvests are scheduled. The number of harvest jobs feeding into the job backlog can be greatly influenced by the cloud harvesting strategy selected; more aggressive strategies lead to more jobs.
The process responsible for scheduling jobs performed by the workers. The scheduler will schedule regular cadence jobs, such as harvesting as well as on-demand jobs. It maintains different priority queues to help surface high priority jobs.
A Google-based, portable, extensible open-source platform for managing containerized workloads and services.
Multifactor authentication (MFA)--also known as two-factor authentication (2FA or TFA)--enhances security by verifying a user's identity using multiple methods of authentication from independent categories of credentials.
A User with the highest level of privileges or authorizations. Admins generally will retain all permissions to read/view, write/edit, delete, etc. An Org Admin can do everything operational in their organization in the tool. See also Admin and Domain Admin.
In InsightCloudSec, organizations allow for complete isolation between cloud accounts, resources, and users on an installation. Cloud accounts and their resources can only belong to one Organization and cannot be modified or viewed from another Organization.
Note: GCP uses "Organization" to refer to a collection of projects.
Refers to Owners of resources. Can only be set by Admins. Ownership can be used to set scope on resource searches, making it easier for the user to focus on the resources they care about.
The cloud provider-defined permissions granted to InsightCloudSec to enable harvesting resource information and allowing InsightCloudSec to take resource management actions. These permissions can be read-only, admin, or some combination of the two. With each release, InsightCloudSec expands its supported resources and correspondingly requires additional permissions to harvest those resources.
An element of a software program that can be added to provide support for specific features or functionality.
Collections of permissions that provide InsightCloudSec user-defined access to connected accounts. Policies can range from Standard User Policy, containing read-only permissions, to a Power User Policy, allowing InsightCloudSec to execute user-defined actions within accounts.
Relative to EDH, a Producer is an AWS account that is configured to forward cloud events to another account. See Event-Driven Harvesting (AWS) for details.
The allocation of a cloud provider's resources and services to a customer; such services include IaaS, PaaS, or SaaS. In InsightCloudSec, "Provisioning" can also refer to the permission that a user has been given to acquire or add such services to their cloud account.
A geographic location in which public cloud service providers' data centers reside.
A virtual (cloud-hosted) service, utility, or function. Cloud accounts are made up of resources; while different providers use different names in referring to their specific offerings, InsightCloudSec uses normalized names throughout the tool for these resources. For example, AWS’ S3 Bucket, GCP’s Cloud Storage, Azure’s Blob Storage Container, and Alibaba’s Object Storage Bucket all refer to storage resources; InsightCloudSec refers to all of these resources as a Storage Container.
Check out more under Resources.
Collections of resources; can be used to apply granular permissions to a subset of a cloud footprint to improve visibility or to apply custom policy.
Resource Type Categories
Categories of resources by type. InsightCloudSec uses five normalized categories: Compute, Containers, Storage, Network, and Identity & Management.
Roles are used to manage the permissions of basic users. They can be customized to permit read, manage, and delete privileges. They can be customized to view all resources or resources defined by Cloud account, Resource Group, or Badge.
Note: While roles relate to users generally, entitlements relate to a users' ability to interact with specific portions of the tool, e.g., Tag Explorer or BotFactory.
Scopes define the domain (limits or bounds) on clouds and resource groups in searches, displays, and bot actions.
Two-factor authentication (also 2FA or MFA) enhances security by verifying a user's identity using multiple methods of authentication from independent categories of credentials.
A key/value pair used for identifying and labelling resources.
InsightCloudSec users are distinguished by type: Basic User, Domain Admin, or Organization Admin (Org Admin). Basic Users can be assigned various roles and permissions or privileges. These characteristics are established in the Identity Management portion of the tool. Org Admins have all privileges confined to a single InsightCloudSec organization. Domain Admins have all privileges across an entire InsightCloudSec instance.
See also Roles, Domain Admin.
A list of users linked to a list of Roles. User Groups are leveraged in conjunction with Roles to grant permissions to Basic Users.
A generic term for a process that does something other than serve web requests. It may process a queue, run scheduled jobs using process files, or any number of other support-type activities. It generally does not interface with users.
Updated 3 months ago