Understand and Prioritize with Layered Context
Layered Context provides a holistic view of the most critical resources found in all environments that are connected to InsightCloudSec.
Explore Layered Context
In InsightCloudSec, navigate to Security > Layered Context to start viewing high risk resources and their impact on Insights in your environment.
Filter
Layered Context has filtering functionality to effectively narrow the scope of and navigate the data.
Add Filter
Filtering allows for narrowing the scope of the resources list using properties like cloud accounts, clusters, resource groups, etc. Some things to note about filtering behavior:
- Each selected filter updates dynamically with options appropriate for the property selected.
- After selecting an initial property, click + Add Filter to add an additional filter and further narrow the scope.
- If filtering on a Resource Tag:
- Searching for a tag is case insensitive.
- New tags are harvested every 12 hours by the
ResourceTypeTrigramsProcess
background job (see System Settings for more information).
To add a filter:
- Click the Add Filters button to open the side panel.
- Select and configure a property to get started.
- After configuring your desired filters, click Apply to update the scope for the feature.
Save Filters (Optional)
After Adding a Filter, you can save it so that it can easily be reused the next time you access the feature. Saved filters are feature-specific (since options vary between features), i.e., a saved filter in Feature "A" will only be available in Feature "A" and will not be available in Feature "B".
To save a filter:
- Once filter(s) have been applied, ensure the filters list is expanded by clicking the arrow (>)
- Click the ellipsis (...) button, then click Save Filter.
- Provide a name for the filter and an optional description.
- Select the checkbox for Set as Default Filter to set this filter as the default for the feature.
- Select the checkbox for Make this a Public Filter to allow other users to see the filter.
- Click OK.
Once a filter has been successfully saved, it can be accessed (along with other saved filters) or edited from the same ellipsis menu.
Trend and Analytics
The Trend and Analytics section of Layered Context provides three high-level visuals to summarize risk associated with your resources.
Field | Description |
---|---|
Risky Resources | The number of high-risk resources that are included in your overall footprint. This count includes resources that are impacted by at least 1 Critical Finding for Insights or Vulnerabilities and are considered to have public exposure - the combination of these two elements have been selected to help you identify resources that should be prioritized for review. |
Insights Summary | A summary of the number of resources with findings for each of the severity categories available (for example: critical, high, medium). Hovering over the severity will display the total number of resources in each severity category. |
High Risk Resource Types | Displays a visual breakdown of the top 5 high risk resource types with a count and overall percentage (for example: resourceaccesslist includes 138 resources, representing 12.8% of your total resources) |
Data Display
This display contains all of the data analyzed within Layered Context. The data display is split amongst three tabs: Resources, Clouds, and Applications. For organizations with large and complex cloud environments, these scopes provide the ability to evaluate a single cloud account, Application, or resource. When combined with filtering, these scoping capabilities enable you to quickly navigate to specific areas that you want to evaluate for risk. Each tab includes the functionality for:
- Search -- Type into the search bar and the list of resources will automatically filter to match the criteria. Currently, search is limited to the resource name and type metadata attributes.
- Download -- To save a copy of the information found in the resource list, click Download next to the search bar and select either CSV or JSON. The file will be prepared in the background until it is ready to be downloaded by your web browser. If the file preparation takes longer than 10 minutes, it will timeout, so it's best to narrow the scope prior to downloading.
- Column Options -- Column options vary for each of the additional scope options (Clouds, Applications, and Resources) and are provided in detail below.
Resources
Selecting the Resources tab displays Layered Context details for all of your connected cloud resources. Selecting an individual resource by clicking on the name opens a Context Detail pane where you can explore the properties of the resource, Insight Findings, view Related Resources, and download JSON for that individual resource (along with many other contextual details). For each individual resource available in Layered Context, the additional details (properties, actions, tag, etc) will vary. Areas that are not applicable and/or those that do not contain data will be inactive.
The following details display by default for Resources.
Field | Description |
---|---|
Resource Name | The name of the resource |
Resource Type | The type of resource |
Account Name | The name and type of the cloud account the resource is associated with |
Public Access |
|
Insights Summary | Displays highest criticality available (for example if the resource is only associated with an Insight (or Insights) with a misconfiguration identified with a Medium severity, that is what will display in the Insights Summary).
|
Vulnerabilities Summary | Displays the badge(s) and count (Critical, High, Medium, Low), for the highest severity vulnerabilities identified for the selected resource.
|
Threat Findings Summary | Displays the badge for highest severity Threat Finding for the selected resource
|
Action | Offers a context menu with links to:
|
Public Access
Public Accessibility is a major security risk and as such has a huge impact on risk for a given resource. InsightCloudSec designates something as publicly accessible if a relevant Insights fails when checking a given resource. When you open the Context Details > Public Access tab, you'll find a table of all Public-related Insights for the given resource type as well as the first date the resource failed the Insight and the result (if the resource failed, it's Public; if it has not failed or the Insight does not apply, it's not Public). Click the + next to a Source to review detailed information about the Insight.
Public Insights
You can find relevant Insight examples by visiting the Insight Library and searching for public
. Some examples include:
- Instance with a Public IP Exposing SSH
- Snapshot Available to the Public
- Artifact Registry Allows Public Access
Source Data
For select Resources, there is an additional Context Details pane called Source Data that surfaces raw data about the resource harvested directly from the Cloud Service Provider (CSP). This additional context about your resources can help to further investigate configuration issues or provide deeper analysis. Click into the document viewing area, then use ⌘F
(MacOS) or CTRL+F
(Windows) to search through the data. For full support details, see Resources
Documents will only be stored if changes are detected for a resource or if new resources have been created, so some supported resources may not have any source documents.
Clouds
Selecting the Clouds tab allows you to view Layered Context for your cloud resources through the scope of your cloud account(s). Selecting an individual cloud by clicking on the name generates a view of the resources for the cloud selected. This view can be refined further through filtering to help you target specific security concerns within a cloud account.
The following details display by default for Clouds.
Field | Description |
---|---|
Cloud Name | The name of the cloud account |
Cloud | The type of cloud account |
Resources | The resource count for the cloud account |
Public Access |
|
Insights Summary | Displays highest criticality available (for example if the resource is only associated with an Insight (or Insights) with a misconfiguration identified with a Medium severity, that is what will display in the Insights Summary).
|
Vulnerabilities Summary | Displays the badge(s) and count (Critical, High, Medium, Low), for the highest severity vulnerabilities identified for the selected cloud.
|
Threat Findings Summary | Displays the badge for highest severity Threat Finding for the selected cloud
|
Action | Offers a context menu with a link to view the Resources associated with the given cloud. |
Applications
Selecting the Applications tab allows you to view Layered Context for your cloud resources through the scope of your Applications. This feature requires some additional configuration that you can learn more about through the Application Context page.
Selecting an individual application generates a view of the resources within that application. This view can be refined further through filtering to help you target specific security concerns within an application.
The following details display by default for Applications.
Field | Description |
---|---|
Application Name | The name of the application |
Business Critical | Identifies an application as business critical |
Resources | The resource count for the application |
Public Access |
|
Insights Summary | Displays highest criticality available (for example if the application is only associated with an Insight (or Insights) with a misconfiguration identified with a Medium severity, that is what will display in the Insights Summary).
|
Vulnerabilities Summary | Displays the badge(s) and count (Critical, High, Medium, Low), for the highest severity vulnerabilities identified for the selected application.
|
Threat Findings Summary | Displays the badge for highest severity Threat Finding for the selected application
|
Action (View Resources) | Creates a scoped view of resources where you can do the following:
|
Layered Context API
There are two endpoints to enable interacting with Layered Context programmatically.
- Detail Resource: This endpoint details a resource, including parent account information and dependencies. Read more about in the InsightCloudSec API reference.
- Export Source Data: This endpoint will export a given resource's source data.