Layered Context - User Guide

The information on this page has moved

For the most up to date Layered Context guidance, go to Layered Context.

Layered Context provides access to the visualizations, search functionality, filters, as well as a table/list display of clouds, applications, and resources. Any resource listed here is associated with one or more Insights.

Go to Security > Layered Context to get started.

Layered Context - Main Page

Layered Context Page

The Layered Context Page includes:

  • Trend and analytics visualizations that provide a snapshot of risk
  • Search functionality and filtering that allow you to narrow the list of resources to only the most critical or vulnerable
  • A table/list display with a list of clouds, applications, and resources that are currently associated with one or more InsightCloudSec Insight, Vulnerability, or Threat Finding

Visualizations (Trend and Analytics)

The Trend and Analytics section of Layered Context provides three high-level visuals to summarize risk associated with your resources.

FieldDescription
Risky ResourcesThe number of high-risk resources that are included in your overall footprint. This count includes resources that are impacted by at least 1 Critical Finding for Insights or Vulnerabilities and are considered to have public exposure - the combination of these two elements have been selected to help you identify resources that should be prioritized for review.
Insights SummaryA summary of the number of resources with findings for each of the severity categories available (for example: critical, high, medium). Hovering over the severity will display the total number of resources in each severity category.
High Risk Resource TypesDisplays a visual breakdown of the top 5 high risk resource types with a count and overall percentage (for example: resourceaccesslist includes 138 resources, representing 12.8% of your total resources)

Scoping the Data

Layered Context includes tabs/sections to narrow your focus to specific categories. We include Clouds, Applications, and Resources as a way to explore and analyze your risk. For organizations with large and complex cloud environments, these scopes provide the ability to evaluate a single cloud account, Application Context, or resource. When combined with filtering, these scoping capabilities enable you to quickly navigate to specific areas that you want to evaluate for risk.

TabDescription
CloudsSelecting the "Clouds" tab allows you to view Layered Context for your cloud resources through the scope of your cloud account(s). Selecting an individual cloud (by clicking on the name) generates a view of the resources for the cloud selected. This view can be refined further through filtering to help you target specific security concerns within that cloud account.
ApplicationsSelecting the "Applications" tab allows you to view Layered Context for your cloud resources through the scope of your Applications. This feature requires some additional configuration that you can learn more about through the Application Context page.

Selecting an individual application generates a view of the resources within that application. This view can be refined further through filtering to help you target specific security concerns within the application.
ResourcesSelecting the "Resources" tab displays Layered Context details for all of your connected cloud resources. Selecting an individual resource (by clicking on the name), provides a resource detail pane with where you can explore the properties of the resource, Insight Findings, view Related Resources and download JSON for that individual resource (along with many other contextual details).

Filtering & Searching

Layered Context has searching and filtering functionality to narrow the scope of the resource list. These features can be used together to effectively and quickly navigate. The "Add Filter" button also allows you to select a filter that will be applied to the Trend and Analytics visualizations.

Layered Context - Filtering

Add Filter

Filtering ("Add Filter") allows for narrowing the scope of the resources list using properties like: cloud accounts, clusters, and resource groups. Click the Add Filters button to open the panel and Select a property to get started. After choosing your desired filters, select Apply to update the page to display the results of your specified filters.

Filtering Behavior:

  • Each selected Filter updates dynamically with options appropriate for the property selected.
  • Click + Add Filter to add an additional filter and further narrow the scope.
  • Layered Context supports filtering by a Resource Tag.
    • Searching for a tag is case insensitive.
    • New tags are harvested every 12 hours by the ResourceTypeTrigramsProcess background job (see System Settings fore more information).

Save Filters

After Adding a Filter, you can save it so that can easily be reused the next time you access the feature. Note: Saved filters are feature-specific (since options vary between features), i.e., a Feature "A" saved filter will only be available in Feature "A" and will not be available in Feature "B".

  1. In InsightCloudSec, go to Security > Layered Context.
  2. On the Layered Context page, click Add Filter.
  3. Enter your filter criteria. Tags are case sensitive. New tags are updated every 12 hours.
  4. Click Apply.
  5. (Optional) Save the filter for repeat use.
    1. Click the ellipsis and select Save Filter.
    2. Select whether the filter if the default filter to display.
    3. Select whether to make the filter public.
    4. Click OK.
  6. Review the results.

Type into the search bar and the list of resources will automatically filter to match the criteria. Currently, search is limited to the resource name and type metadata attributes.

Download

To save a copy of the information found in the resource list, click "Download" next to the search bar and select either "CSV" or "JSON". The file will be prepared in the background until it is ready to be downloaded by your web browser.

If the file preparation takes longer than 10 minutes, it will timeout, so it's best to narrow the scope prior to downloading.

Data Display

Below the Trend and Analytics data visualizations is the main table/list display of all of the data (grouped by Clouds, Applications, and Resources) analyzed within Layered Context.

The capabilities for this section of the page (above the data display) include: Search, Download (JSON/CSV), and Column Options. Column options vary for each of the additional scope options (Clouds, Applications, and Resources) and are provided in detail below.

Detailed descriptions of Cloud fields

Cloud

The following details display by default for Clouds.

FieldDescription
Cloud NameThe name of the cloud account
CloudThe type of cloud account
ResourcesThe resource count for the cloud account
Public Access
  • Public: Reflects clouds with public accessibility based on the specified system checks. Click Public to navigate directly to the Context Details > Public Access tab.
  • Not Public: Reflects clouds that are not publicly accessible based on system checks.
Insights SummaryDisplays highest criticality available (for example if the resource is only associated with an Insight (or Insights) with a misconfiguration identified with a Medium severity, that is what will display in the Insights Summary).

  • Critical, High, Medium, Low, Info: The count of the Insights associated with the resource respective to each individual severity. (e.g. Critical = 13, indicates 13 Critical Insights for that resource.)
  • Hover on the Insights badge for the counts of each Insight severity associated with the resource.
  • Click the Insights badge for expanded details on any Insight Findings associated with a specific cloud.
Vulnerabilities SummaryDisplays the badge(s) and count (Critical, High, Medium, Low), for the highest severity vulnerabilities identified for the selected cloud.

  • Critical, High, Medium, Low, Info: The count of the Vulnerabilities associated with the cloud respective to each individual severity. (e.g. Critical = 13, indicates 13 Critical Vulnerabilities for that cloud.)
  • Hover on the Vulnerabilities badge for the counts of each Vulnerability severity associated with the cloud.
  • Select the Vulnerabilities badge for expanded details on any Vulnerabilities associated with a specific cloud.
Threat Findings SummaryDisplays the badge for highest severity Threat Finding for the selected cloud

  • High, Medium, Low: Badges are based on the count of Threat Finding occurrences associated with the cloud respective to reach individual severity (e.g., Low = 399 indicates 399 Low severity Threat Finding occurrences for that cloud.)
  • Select the Threat Findings badge for expanded details on any Thread Findings associated with a specific cloud.
ActionOffers a context menu with a link to view the Resources associated with the given cloud.
Detailed descriptions of Applications fields

Applications

The following details display by default for Applications.

FieldDescription
Application NameThe name of the application
Business CriticalIdentifies an application as business critical
ResourcesThe resource count for the application
Public Access
  • Public: Reflects applications with public accessibility based on the specified system checks. Click Public to navigate directly to the Context Details > Public Access tab.
  • Not Public: Reflects applications that are not publicly accessible based on system checks.
Insights SummaryDisplays highest criticality available (for example if the application is only associated with an Insight (or Insights) with a misconfiguration identified with a Medium severity, that is what will display in the Insights Summary).

  • Critical, High, Medium, Low, Info: The count of the Insights associated with the application respective to each individual severity. (e.g. Critical = 13, indicates 13 Critical Insights for that application.)
  • Hover on the Insights badge for the counts of each Insight severity associated with the application.
  • Click the Insights badge for expanded details on any Insight Findings associated with a specific application.
Vulnerabilities SummaryDisplays the badge(s) and count (Critical, High, Medium, Low), for the highest severity vulnerabilities identified for the selected application.
  • Critical, High, Medium, Low, Info: The count of the Vulnerabilities associated with the application respective to each individual severity. (e.g. Critical = 13, indicates 13 Critical Vulnerabilities for that application.)
  • Hover on the Vulnerabilities badge for the counts of each Vulnerability severity associated with the application.
  • Select the Vulnerabilities badge for expanded details on any Vulnerabilities associated with a specific application.
Threat Findings SummaryDisplays the badge for highest severity Threat Finding for the selected application

  • High, Medium, Low: Badges are based on the count of Threat Finding occurrences associated with the application respective to reach individual severity (e.g., Low = 399 indicates 399 Low severity Threat Finding occurrences for that application.)
  • Select the Threat Findings badge for expanded details on any Thread Findings associated with a specific application.
Action (View Resources)Creates a scoped view of resources where you can do the following:

  • Click the left icon to View Context Details or click the right icon Download Source Data.
  • Refer to the Context Details section for more information on exploring individual resources.
Detailed descriptions of Resources fields

Resources

The following details display by default for Resources.

FieldDescription
Resource NameThe name of the resource
Resource TypeThe type of resource
Account NameThe name and type of the cloud account the resource is associated with
Public Access
  • Public: Reflects resources with public accessibility based on the specified system checks. Click the column value to navigate directly to the Context Details > Public Access tab.
  • Not Public: Reflects resources that are not publicly accessible based on system checks.
Insights SummaryDisplays highest criticality available (for example if the resource is only associated with an Insight (or Insights) with a misconfiguration identified with a Medium severity, that is what will display in the Insights Summary).

  • Critical, High, Medium, Low, Info: The count of the Insights associated with the resource respective to each individual severity. (e.g. Critical = 13, indicates 13 Critical Insights for that resource.)
  • Hover on the Insights badge for the counts of each Insight severity associated with the resource.
  • Click the Insights badge for expanded details on any Insight Findings associated with a specific resource.
Vulnerabilities SummaryDisplays the badge(s) and count (Critical, High, Medium, Low), for the highest severity vulnerabilities identified for the selected resource.

  • Critical, High, Medium, Low, Info: The count of the Vulnerabilities associated with the resource respective to each individual severity. (e.g. Critical = 13, indicates 13 Critical Vulnerabilities for that resource.)
  • Hover on the Vulnerabilities badge for the counts of each Vulnerability severity associated with the resource.
  • Select the Vulnerabilities badge for expanded details on any Vulnerabilities associated with a specific resource.
Threat Findings SummaryDisplays the badge for highest severity Threat Finding for the selected resource

  • High, Medium, Low: Badges are based on the count of Threat Finding occurrences associated with the resource respective to reach individual severity (e.g., Low = 399 indicates 399 Low severity Threat Finding occurrences for that resource.)
  • Select the Threat Findings badge for expanded details on any Thread Findings associated with a specific resource.
ActionOffers a context menu with links to:
  • View Context Details
  • Download this resource's Source Data

Context (Resource)

Selecting an individual resource by name, either from the Resources tab/section, or the scoped Resources tab/section generated by viewing data through Clouds or Applications, opens a detailed view of the context for the selected resource.

Resource Detail Availability

For each individual resource available in Layered Context the additional details (properties, actions, tag, etc) will vary.

  • Areas that are not applicable, and/or those that do not contain data will be grayed out.
  • Depending on the resource different context is available.

The following details display by default for Context (Resources).

DetailsDescription
PropertiesThis tab provides a list of metadata attributes or properties for the selected resource, such as Cloud Account details, Resource ID, and a direct link.
Action(s)A list of actions available for the selected resource. These will vary based on permissions and resource type.
TagsTags associated with the selected resource.
Insight FindingsProvides a detailed list of the Insights this resource is associated with.

  • Clicking on the arrow next to the individual line expands to show details for the selected Insight.
  • In the “Packs” column, hover over the count of packs to view a list of Insight Packs that contain the Insight.
  • Click on the filtering option to the right of the sort option to expose/select additional filtering for the Insight severities.
Public AccessFor resources marked as publicly accessible, this tab contains a count of checks and details for each check, including the date it was identified and the results (Public/Not Public).

  • Sources include: Harvesting Evaluation, Insights (ICS), and Cloud Service Provider (CSP).
  • Expanding an individual source displays details for that source. For example, a specific Insight that identifies Public Access. When expanded, this displays the Overview of the Insight and any recommended remediation (when available).
VulnerabilitiesThis tab will provide a detailed list of the Vulnerabilities associated with this resource when available. Note: This capability is still in development. See Container Vulnerability Assessment for more information on vulnerabilities.
Threat FindingsProvides a detailed list of the Threat Findings associated with this resource. Each line includes: Severity, Name, Provider ID, Occurrences (of each finding), First Seen (for each occurrence) and Last Seen (for last or most recent occurrence). Clicking on the arrow next to the individual line expands to show details for the selected Threat Finding.
Source DocumentsSee the full section below for more information.
Related ResourcesDisplays a list of associated resources with links to those resources/details.
ActivityDisplays a list of activities associated with the resource.
Additional ColumnsAdditional columns beyond "Activity" may include Flow Log Findings, Groups, Policies, Custom Policies, etc. And will vary depending on the type of resource selected.

Source Data

For select AWS resource types, there is an additional detail pane, Source Data, that surfaces raw data about the resource harvested directly from the Cloud Service Provider (CSP). This additional context about your resources can help to further investigate configuration issues or provide deeper analysis. Click into the document viewing area, then use ⌘F (MacOS) or CTRL+F (Windows) to search through the data. For full support details, see Resources

Documents will only be stored if changes are detected for a resource or if new resources have been created, so some supported resources may not have any source documents.

Layered Context API

There are two endpoints to enable interacting with Layered Context programmatically.

  • Detail Resource: This endpoint details a resource, including parent account information and dependencies. Read more about in the InsightCloudSec API reference.
  • Export Source Data: This endpoint will export a given resource's source data.