How does Security and Compliance Center work?
With IBM Cloud® Security and Compliance Center, you can evaluate for and view the current compliance posture of your deployed resources through a unified dashboard. Each resource is evaluated to determine its compliance to a specific control that you select. To learn more about each entity that you encounter with the service, review the terminology and how it works.
Terminology
- Control
-
A technical, administrative, or physical safeguard that is designed to meet a set of defined security and privacy requirements. Controls exist to prevent, detect, or lessen the ability of a threat to exploit a vulnerability.
- Control library
-
A collection of predefined or custom controls. Control libraries show all the controls in your accounts that are available to be evaluated. A library is helpful for organizing and versioning of your controls. A library is structured as follows.
- Profile
-
A group of controls that are related to a specific compliance objective.
Although very similar in structure to a control library, a profile can be attached to a set of resources and be evaluated. When you create the attachment, you can set the parameters that define the way that the evaluation is done.
- Specification
-
A statement that defines the specific security and privacy requirements that a control must meet. For example,
Check whether App ID Cloud Directory users aren't able to update their own accounts
. - Assessment
-
The actual evaluation of a configuration for compliance with applicable standards. An assessment can be either automated or manual depending on the control. Currently, the only available type of assessment is an IBM Cloud rule.
- Rule
-
A set of conditional statements that are used to determine whether a resource configuration is in compliance. To evaluate a rule, you must associate it with a profile through an assessment.
- Parameter
-
The specific configuration property that is evaluated. Each parameter is assigned a value by default that can be customized when an attachment is created. For example, if a control evaluates which region that a resource exits in, you can specify the region that you want to check for by defining the parameter.
- Scope
-
The group of resources that you want to evaluate. In the new API-based architecture, a scope can be an Enterprise, Account group, Account, or Resource group.
- Subscope
-
A segment of a scope. Subscopes are used to ensure that the members of your teams who review results only have access to the information regarding the instances that they have access to.
- Attachment
-
The connection between a profile and scope that defines the way that Security and Compliance Center conducts an evaluation. An attachment is formed by selecting the grouping of resources that you want to evaluate and a profile. Then, you specify the parameters that you want to evaluate for. Attachments are evaluated once per day or can be initiated as needed.
- Report
-
The information that is returned by an evaluation is known as a report. For a breakdown of the information in the report, see Understanding results.
Understanding the user flow
Now that you have an understanding of the various entities that exist within Security and Compliance Center, how do they work together? The following diagram details the user flows that you might take when you are working with Security and Compliance Center.
- As a security or compliance focal, choose a predefined profile that is most suitable for your organization. Optionally you can customize the profile by creating custom rules, adding or removing rules, or building your own profile based on the catalog of controls.
- To start scanning your resources, create an attachment of the profile to the scope of resources you want to scan. You can optionally customize parameters of the controls when you create the attachment.
- After the attachment is created, your resources are evaluated one time per day by Security and Compliance Center.
- As results are returned, they are forwarded to a Cloud Object Storage bucket that you own.
- Results are shown in the Security and Compliance Center dashboard.