Introducing the New Data Security Dashboard!

By Sabrina Lupșan
Thursday, December 15, 2022
Introducing the New Data Security Dashboard!

We have released a new, powerful Data Security Dashboard to provide the visibility you need for your cloud. The Dashboard displays information about: 

  • Encryption, 
  • The management of cryptographic keys, 
  • Publicly accessible storage assets such as VMs, databases, buckets, and others, 
  • Databases and misconfigurations related to them, 
  • Containers such as blobs and buckets that may vulnerable, and others. 

These DSPM (Data Security Posture Management) capabilities enable users to detect attack paths for data storage assets and quickly mitigate them.  

The first section of the dashboard shows us the percentage of storage assets that are:  

  • unencrypted,  
  • encrypted with provider-managed-key, and  
  • encrypted with CMK (Customer Managed Key).  
Progress card for encryption status

This card is a good indicator of progress, and, by clicking on each section of the status bar, we see which assets fit in each of those states. Using this feature, you are at a click away from finding out which of your storage cloud assets are unencrypted. 

The next section contains the Publicly Accessible card, which provides visibility over a multitude of assets, as you can see in the image below. When you click on each element, you see a list of affected assets, along with the associated risk.

Publicly accessible cloud assets

Let’s look at this feature in more detail to understand how this helps secure your cloud infrastructure. 

The “Readable Object Containers” and “Writable Object Containers” refer to storage assets such as buckets and blobs. Object containers should not be publicly accessible unless it is necessary, since individuals could then read or overwrite possibly sensitive data without having to perform any kind of authentication or authorization. 

The next item in this section highlights database instances that have public IP addresses. Databases should be configured with private IP addresses to reduce attack surface and increase security. 

The last items in this list are publicly accessible: 

  • queues,  
  • encryption keys, and  
  • disks.  

Cloud queues act like buffers to prevent data loss when services are too busy and cannot process incoming messages, and therefore should not be publicly accessible to prevent data leakage or data tampering. The control regarding encryption keys checks for attached policies that may allow public access to the key. The other control ensures there are no disks attached to VMs reachable from the internet. 

The next card on the Data Security Dashboard provides an overview of the encryption keys used in your cloud infrastructure. Cryptographic key management is a very important but sometimes overlooked aspect of the encryption process.  

Cryptographic key management in Cyscale

Cyscale checks if the encryption keys are stored on a vulnerable VM or if they have a permissive access policy to identify possible attack paths. Moreover, important information is highlighted, such as: 

  • keys that are in use and are scheduled for deletion, 
  • keys that haven’t been rotated in a long time, and 
  • keys that will expire soon. 

The next two sections in this dashboard focus on object containers, such as buckets or blobs, and on databases. Here, you can see some of the categories of vulnerabilities Cyscale has identified and checked your cloud environment against.  

The first card presents the state of your object containers. 

Object containers with issues

Using this feature, we identify attack paths that may compromise your cloud assets and help you solve them. 

For example, a common attack is exploiting VMs that have open management ports. If you have a VM that has permissions on a bucket, and that VM is compromised, your bucket may be compromised as well.  

Using the Cyscale Knowledge Graph, you can see that the VM named "sql-instance" has an instance profile that gives it full access to the bucket on the far right, and the VM also has port 22 (SSH) open. The VM is thus connected to the internet and therefore puts the data stored in the bucket at risk. 

Cyscale Knowledge Graph highlighting an attack path

Other critical issues highlighted for object containers include: 

  • Enabling public access to storage assets, 
  • Having an overly-permissive access policy,  
  • Not enabling versioning, and others. 

Clicking on “Object containers with public access”, we get a list of misconfigured assets as well as details like: 

  • Connectors, which represents the cloud or identity provider account, 
  • Tags,  
  • Risks. 
List of misconfigured assets

Moving on to the databases card, using controls, Cyscale checks for the following misconfigurations: 

  • Databases with public IP addresses, 
  • Databases with outdated engine versions, 
  • Databases without deletion protection, 
  • Databases with no encryption, 
  • Databases with no/old TLS. 
Databases with issues in Cyscale

Use the multitude of features present in the Cyscale Data Security Dashboard to eliminate data exposure through data storage misconfigurations. Check out our product in the playground or schedule a demo with us to start your cloud security journey! 

Interesting? Share it

Stay connected

Receive new blog posts and product updates from Cyscale

Product Playground

View a fully-populated product demo. All features - no setup, no commitment.

Schedule a Demo

Sign up for a custom demo to see how we close security gaps and help you move to the cloud.

Request a Demo >
MAS TRM Compliance in the Cloud
ComplianceTuesday, January 31, 2023

MAS TRM Compliance in the Cloud

Author image
By Sabrina Lupșan
Announcing the New Whitepaper: The In-Depth Guide to Cloud Compliance in 2023
NewsThursday, January 26, 2023

Announcing the New Whitepaper: The In-Depth Guide to Cloud Compliance in 2023

Author image
By Sabrina Lupșan
NIST Compliance in the Cloud
ComplianceWednesday, January 11, 2023

NIST Compliance in the Cloud

Author image
By Sabrina Lupșan
Cyscale Logo
Cyscale helps companies embrace their digital future by protecting apps and data in the cloud. With the innovative Security Knowledge Graph™ at its core, Cyscale helps you easily track security and compliance across your multi-cloud environment.

Stay connected

Receive new blog posts and product updates from Cyscale

By clicking Subscribe, I agree to Cyscale’s Privacy Policy


© 2023 Cyscale Limited

crunch base icon
angel icon