We are excited to announce the launch of our new and improved AWS Overview Dashboard. In our continuous efforts to enhance your experience and provide you with advanced security analytics, we have invested significant time and resources into developing a more intuitive and powerful dashboard.
This document serves as an introductory guide to the enhanced features and benefits of our new AWS Overview Dashboard. The goal is to highlight the value that the new dashboard brings to your organization's security operations.
The AWS Overview dashboard offers a well-rounded perspective of your AWS resources and security posture. It provides a unified and comprehensive view that highlights critical security risks and vulnerabilities in your AWS environment. By presenting all the essential information in a single dashboard, it streamlines your security monitoring and management processes.
This immediate emphasis on security enhances the understanding of the security posture within the AWS environment.
In the top section of the AWS Overview dashboard, you can find essential services such as EC2, Lambda, ELB, IAM, and more, and the number of resources within each service in your workload. Additionally, it provides information about CloudTrail events from the past 24 hours.
The Resources with inbound access widget showcases various AWS resources, such as Amazon EC2, AWS Lambda, Amazon S3, etc, that are exposed to the internet by inbound access. By running queries on components like subnets, security groups, and route tables, the dashboard identifies vulnerabilities related to incoming network traffic or access permissions.
Clicking on any of these resources navigates you to the details page where you can view the path through which the resource is exposed to the internet.
In the upper right corner, you will see an option labeled "Steps to Fix." Clicking on this option will provide you with detailed instructions on how to resolve the vulnerability. There is also a “Remediate” option through which, with just a single click, you can initiate the remediation process, allowing Uptycs to automatically resolve the identified issues.
The widget displays the count of essential resources within each service that have public IPs. Clicking on any of these resources will navigate you to a page with details on the selected resource.
The Misconfigurations widget presents you with a list of the Top 20 misconfigurations detected across your AWS environment. These misconfigurations are ordered by priority, with the highest score at the top.
This section offers a comprehensive and granular view of potential risks, empowering you to proactively safeguard your systems. By clicking on the misconfiguration, you can delve into the specific details, gaining deeper insights into the issues at hand.
The ‘Threats’ widget presents a prioritized list of the Top 20 threats in your AWS environment. By clicking on the threat, you can view detailed insights into these potential risks. These threats are ranked in order of priority, with the highest-scored threats appearing at the top.
The IAM Vulnerabilities by Category widget is a tool that assists in detecting security gaps within your IAM configurations. It specifically highlights potential vulnerabilities concerning the root account, risky permissions, and improper policies.
By providing actionable insights, users can address these vulnerabilities effectively.
By selecting "View all AWS resources" at the top of the AWS Overview dashboard, you will be directed to the AWS Inventory dashboard.
This dashboard offers a comprehensive view of all AWS resources within your workload. It allows you to access detailed information about each resource, and resource types. Additionally, you can view alerts associated with each service. Each key service also has its own insights dashboard, which you can view by clicking on the ‘Insights’ button next to the service.