Skip to content

[Onboarding] Security quickstart guides #2017

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 43 commits into from
Jul 17, 2025
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
43 commits
Select commit Hold shift + click to select a range
01a1ed3
Create get-started-detect-with-siem.md
jmikell821 Jun 30, 2025
55a8a93
Update get-started-detect-with-siem.md
jmikell821 Jul 2, 2025
1398ade
Changes to GS files.
jmikell821 Jul 3, 2025
5e795ee
Saving changes.
jmikell821 Jul 4, 2025
72ddabb
Adds file to TOC.
jmikell821 Jul 4, 2025
e5a2ea9
Merging feedback + adding some more content
jmikell821 Jul 8, 2025
366b047
Merge branch 'main' into gs-sec-siem-guide
jmikell821 Jul 8, 2025
d620f71
Fixing ref link + more edits.
jmikell821 Jul 8, 2025
c07f7a3
Saving building blocks for cloud security
jmikell821 Jul 10, 2025
f6764e8
Merge branch 'main' into gs-sec-siem-guide
jmikell821 Jul 10, 2025
3a58af1
Saving changes + updating main branch
jmikell821 Jul 10, 2025
eb55753
Merge branch 'gs-sec-siem-guide' of github.com:elastic/docs-content i…
jmikell821 Jul 10, 2025
fc4ca94
Saving...
jmikell821 Jul 13, 2025
698fe10
Some more edits...
jmikell821 Jul 14, 2025
d8ca24b
Merge branch 'main' into gs-sec-siem-guide
lcawl Jul 14, 2025
6e9a726
Update solutions/security/get-started.md
lcawl Jul 15, 2025
d430f21
Update solutions/security/get-started.md
lcawl Jul 15, 2025
8c8db2f
Update solutions/security/get-started/get-started-cloud-security.md
lcawl Jul 15, 2025
1663416
Update solutions/security/get-started/get-started-cloud-security.md
lcawl Jul 15, 2025
726b74b
Update solutions/security/get-started/get-started-cloud-security.md
lcawl Jul 15, 2025
379d2d1
Update solutions/security/get-started/get-started-detect-with-siem.md
lcawl Jul 15, 2025
1da57ed
Update solutions/security/get-started/get-started-detect-with-siem.md
lcawl Jul 15, 2025
ac11df3
Update solutions/security/get-started/get-started-detect-with-siem.md
lcawl Jul 15, 2025
1db831d
Update solutions/security/get-started/get-started-endpoint-security.md
lcawl Jul 15, 2025
c24626c
Update solutions/security/get-started/get-started-endpoint-security.md
lcawl Jul 15, 2025
a7a9d0f
Update solutions/security/get-started/get-started-endpoint-security.md
lcawl Jul 15, 2025
60fb794
Update solutions/security/get-started/get-started-cloud-security.md
lcawl Jul 15, 2025
ae04263
Update solutions/security/get-started/get-started-cloud-security.md
lcawl Jul 15, 2025
e6acf64
Update solutions/security/get-started/get-started-cloud-security.md
lcawl Jul 15, 2025
807ae30
Update solutions/security/get-started/get-started-cloud-security.md
lcawl Jul 15, 2025
3c85d8d
Update solutions/security/get-started/get-started-endpoint-security.md
lcawl Jul 15, 2025
e9e1792
Update solutions/security/get-started/get-started-detect-with-siem.md
lcawl Jul 15, 2025
18eae0c
Update solutions/security/get-started/get-started-cloud-security.md
lcawl Jul 15, 2025
8b48968
Update solutions/security/get-started/get-started-detect-with-siem.md
lcawl Jul 15, 2025
06a7c1d
Update solutions/security/get-started/get-started-detect-with-siem.md
lcawl Jul 15, 2025
b9e32ea
Update solutions/security/get-started/get-started-detect-with-siem.md
lcawl Jul 15, 2025
f9f2951
Revert change in get-started-detect-with-siem.md
lcawl Jul 16, 2025
a314cc5
Merge branch 'main' into gs-sec-siem-guide
lcawl Jul 16, 2025
13643c6
Remove note
lcawl Jul 16, 2025
414dd02
Address policy configuration feedback
lcawl Jul 16, 2025
21bbbe1
Fix typo
lcawl Jul 17, 2025
a34a171
Merge branch 'main' into gs-sec-siem-guide
lcawl Jul 17, 2025
f596630
Merge branch 'main' into gs-sec-siem-guide
lcawl Jul 17, 2025
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added solutions/images/security-gs-siem-view-type.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
23 changes: 17 additions & 6 deletions solutions/security/get-started.md
Original file line number Diff line number Diff line change
Expand Up @@ -11,14 +11,25 @@ products:

# Get started [getting-started]

This section describes how to set up {{elastic-sec}}, install {{agent}} and the {{elastic-defend}} integration on your hosts, and use the {{elastic-sec}} UI in {{kib}}. To get started, click on one of the following tutorials, depending on your use case:
New to {{elastic-sec}}? Discover more about our security features and how to get started. This section describes how to set up {{elastic-sec}}, install {{agent}} and the {{elastic-defend}} integration on your hosts, and use the {{elastic-sec}} UI in {{kib}}.

* [Detect threats in my data with SIEM](https://www.elastic.co/getting-started/security/detect-threats-in-my-data-with-siem)
:::::{{stepper}}
::::{{step}} Choose your deployment type

::::{note}
If you're migrating to Elastic's SIEM from Splunk, you can use [Automatic Migration](../security/get-started/automatic-migration.md).
Elastic provides several self-managed or Elastic-managed options for you to install {{elastic-sec}}. For simplicity and speed, we recommend one of our {{ecloud}} options. Check out our [deployment types](/deploy-manage/deploy.md#choosing-your-deployment-type) to learn more.
::::

* [Secure my hosts with endpoint security](https://www.elastic.co/getting-started/security/secure-my-hosts-with-endpoint-security)
* [Secure my cloud assets with cloud posture management (CSPM)](https://www.elastic.co/getting-started/security/secure-my-cloud-assets-with-cloud-security-posture-management)
::::{{step}} Ingest your data
After you've deployed {{elastic-sec}}, the next step is to get data into the product before you can search, analyze, or use any visualization tools. The easiest way to get data into Security is through one of our integrations—a pre-packaged collection of assets that allows you to easily collect, store, and visualize any data from any source. You can add an integration directly from the **Get Started** page within the **Ingest your data** section. Choose from one of our recommended integrations, or select one of the other tabs to browse by category. Elastic also provides different [ingestion methods](integration-docs://reference/index.md#ingestion-methods) to meet your infrastructure needs.

:::{{tip}}
If you have data from a source that doesn't yet have an integration, you can use our [Automatic Import tool](/solutions/security/get-started/automatic-import.md).
:::
::::

::::{{step}} Get started with your use case
Not sure where to start exploring {{elastic-sec}}
or which features may be relevant for you? Continue to the next topic to view our quickstart guides, which are tailored to specific use cases and help you complete a core task so you can get up and running.
::::

:::::
92 changes: 92 additions & 0 deletions solutions/security/get-started/get-started-cloud-security.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,92 @@
---
navigation_title: Secure your cloud assets with cloud security posture management
description: A quick start guide to securing your cloud assets using {{elastic-sec}}.
applies_to:
serverless:
products:
- id: security
---

# Quickstart: Secure your cloud assets with cloud security posture management

In this quickstart guide, you'll learn how to get started with Elastic Security for Cloud Security so you can monitor, detect, and investigate anomalous activity within cloud environments.

## Prerequisites

* Access to an {{sec-serverless}} project. If you don't have one yet, refer to [Create a Security project](/solutions/security/get-started/create-security-project.md) to learn how to create one.
* An admin account for the cloud service provider (CSP) you want to use.


## Add the Cloud Security Posture Management integration

The Cloud Security Posture Management (CSPM) integration helps you identify and remediate configurations risks that could potentially undermine the confidentiality, integrity, and availability of your data in the cloud.

To add the CSPM integration:

1. On the **Get Started** home page, in the **Ingest your data** section, select the **Cloud** tab.
2. Select **Cloud Security Posture Management (CSPM)**, then click Add **Cloud Security Posture Management (CSPM)**. The integration configuration page displays.
3. For this guide, we'll be using AWS single account for configuration. Select these options in the configuration integration section.
4. Give the integration a name and enter an optional description.
5. Next, choose your deployment option. An agent-based deployment requires you to deploy and manage {{agent}} in the cloud account you want to monitor, whereas an agentless deployment allows you to collect cloud posture data without having to manage the {{agent}} deployment in your cloud. For simplicity, select **Agentless**.
6. Next, in the **Setup Access** section, choose your preferred authentication method—direct access keys (recommended) or temporary keys. For this guide, we'll use direct access keys.
7. Expand the Steps to Generate AWS Account Credentials, and follow the instructions.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
7. Expand the Steps to Generate AWS Account Credentials, and follow the instructions.
7. Expand the Steps to Generate AWS Account Credentials, and follow the instructions.

I would either bold or lowercase "Steps to Generate AWS Account Credentials"

8. Once you've generated an access key ID and secret access key and pasted the credentials, click **Save and continue** to complete deployment. Your data should start to appear within a few minutes.

:::{image} /solutions/images/security-gs-cloudsec-cspm.png
:alt: Cloud Security Posture management integration
:screenshot:
:::

% insert image

:::{{{note}}}
Consider also adding the Cloud Native Vulnerability Management (CNVM) integration, which identifies vulnerabilities in your cloud workloads.
:::

## View the Cloud Security Posture dashboard

The Cloud Posture dashboard summarizes your cloud infrastructure's overall performance against security guidelines defined by the Center for Internet Security (CIS). It shows configuration risk metrics for all of your monitored cloud accounts and Kubernetes clusters and groups them by specific parameters. All configuration risks the integration identifies are called benchmark rules, and are listed on the **Findings** page.

The dashboard also shows your overall compliance score, and your compliance score for each CIS section. Use these scores to determine how securely configured your overall cloud environment is. To learn more, refer to our [documentation](/solutions/security/cloud/cspm-dashboard.md).

:::{image} /solutions/images/security-gs-cspm-dashboard.png
:alt: Cloud Security Posture dashboard
:screenshot:
:::

To access the Cloud Security Posture dashboard, go to **Dashboards** → **Cloud Security Posture**.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'd suggest moving this line above the screenshot – it its current place it would be easy to miss.



## Analyze Findings

After you install the CSPM integration, it evaluates the configuration of resources in your environment every 24 hours. It lists the results and whether a given resource passed or failed evaluation against a specific security guideline on the **Findings** page, which you can access from the navigation menu. By default, the Findings page lists all findings without any grouping or filtering. However, we recommend [filtering the data](/solutions/security/cloud/findings-page.md#cspm-findings-page-filter-findings) for failed findings. You can also [customize](/solutions/security/cloud/findings-page.md#cspm-customize-the-findings-table) the table to control which columns appear.

To remediate a failed finding, click the arrow to the left of a failed finding to open the findings flyout, then follow the steps under **Remediation**.

:::{image} /solutions/images/security-gs-cloudsec-findings-flyout.gif
:alt: Findings flyout
:screenshot:
:::

:::{{tip}}
On the Cloud Security Posture dashboard, click one of the "View all failed findings" links to display a filtered view.
:::

### Set up alerts

To monitor your configuration more closely, we recommend creating detection rules to detect specific failed findings, which if found, generates an alert.

You can create detection rule directly from the **Findings** page:

1. Click the arrow to the left of a finding to open the findings flyout.
2. Click **Take action**, then **Create a detection rule**. This creates a detection rule that creates alerts when the associated benchmark rule generates a failed finding.
3. To review or customize the new rule, click **View rule**. For example, you may want to set up a rule action—like an email or Slack notification—when alerts are generated. To learn more about rule actions, refer to [](/solutions/security/detect-and-alert/create-detection-rule.md#rule-notifications).

## More resources

Now that you've configured CSPM, check out these other Cloud Security resources:

* [CSPM for Google Cloud Posture (GCP)](/solutions/security/cloud/get-started-with-cspm-for-gcp.md) and [Azure](/solutions/security/cloud/get-started-with-cspm-for-azure.md)
* [Kubernetes security posture management](/solutions/security/cloud/kubernetes-security-posture-management.md)
* [Cloud native vulnerability management](/solutions/security/cloud/cloud-native-vulnerability-management.md)
* [Cloud workload protection for VMs](/solutions/security/cloud/cloud-workload-protection-for-vms.md)
Loading
Loading