Computer security or cybersecurity according to ISACA (Information Systems Audit and Control Association), is the protection of information assets, through the treatment of threats that put at risk the information that is processed, stored and transported by the information systems that are they are interconnected.
The Security menu (or Dashboard) allows you to see, quickly, all the options related to the security of your services.
To go to this section, you must click on the "Security" option, located in the side menu of your SW Panel.
Below we will explain the different sections found in this Dashboard:
Resilience is the ability to prepare for, resist, and recover from cyber threats and attacks. Measure the protection status of your infrastructure against present and future threats, being a key piece in the continuity of your business.
The level of resilience is an indicative percentage that is calculated based on 7 key elements, which contribute to increasing the security of your services, your data and, ultimately, your company. Therefore, with these 7 fields you can get an idea of how you can improve the security of your infrastructure, vulnerabilities or detect what you are most exposed to.
You can have a report if you click on "Request a report now", choosing below, the type of report you want and the email where it will be sent. The report carries a small cost.
In these various graphs, you will be able to observe multiple threats that have been generated in hours, days, months and years.
This option is only visible to customers with Active Next Generation Security. It shows a top 10 threats received or originated by type, country of origin, severity and the total.
To activate the New Generation security, you must follow the following steps:
Within your SW Panel use the search engine to find your Cloud, in our case it is called manuals, yours will have a different name. Once you find it, select it.
Next, go to the "Available enhancements" section and select "Next generation security":
From here you will see that there are four different types of security:
Basic, Standard, Advanced, and Managed. The difference between them is:
|Real time analysis||✅||✅||✅||✅|
|Attack notifications instantly in SW Panel||✅||✅||✅||✅|
|Sending automatic reports - Monthly||✅|
|Sending automatic reports - Weekly||✅||✅||✅|
|Free additional reports||-||2||8||10|
|Real time threat blocking management|
|Real time blocking||✅||✅||✅||✅|
|Low severity threat blocking||✅||✅||✅|
|Medium severity threat blocking||✅||✅||✅||✅|
|High severity threat blocking||✅||✅||✅||✅|
|Configurable lock level||✅||✅||✅|
|List of threats||✅||✅||✅||✅|
|Comprehensive detail of threats||✅||✅||✅|
|Logs analyzed in the report|
|Active locking modules|
|Additional services included|
|Free vulnerability scan||-||1||2||4|
|On demand, paid vulnerability scanning||Ilimitados||Ilimitados||Ilimitados||Ilimitados|
|PCAP (Packet Capture) Download||✅||✅|
|Periodic security audit||✅|
To continue, select the type of security you want:
Once selected, you must formalize the payment:
When your Next Generation Security is activated, you will see in your service tree, your Cloud server with a shield to its right and the description "This service has a subscription to a New Generation Security Level". If you click on the shield, you will access the New Generation Security menu for _Name of your Cloud Server _, which we will explain below.
In this menu you can see all the threats received in a list where you will find the country of origin, ports, destination IP, protocol, details of the attack, etc. Located to the right of each action, there is a drop-down ("..."), where you can click See Threat Detail to expand the information.
In the Threats tab, you will be able to observe the threats in general, both those received and those generated by your own server.
In Security Reports, you can request a report on Network or Perimeter Security and Vulnerabilities of the system of your Cloud server in a short period of time, maximum 6 hours.
You can indicate the type of report and its start and end date. The maximum number of days that the report can include is 30. Next, indicate where the email will be sent and finally proceed to formalization.
Here is an example informe