Getting started with Security and Compliance Center
For highly regulated industries, such as financial services, achieving continuous compliance within a cloud environment is an important first step toward protecting customer and application data. Historically, that process was difficult and manual, which placed your organization at risk. But, with IBM Cloud® Security and Compliance Center, you can integrate daily, automatic compliance checks into your development lifecycle to help minimize that risk.
Running an evaluation does not ensure regulatory compliance. An evaluation provides a point in time statement of your current posture for a specific resource. It is your responsibility to review and interpret the results to ensure that your organization is adhering to the controls that are required for your industry.
Before you begin
Before you get started, be sure that you have the following prerequisites.
- An instance of Security and Compliance Center.
- An instance of Cloud Object Storage that contains a bucket that can be used to store your results data.
- Resources in your account that you want to evaluate.
- The required access to create and manage resources within Security and Compliance Center. To create and manage entities within {scc}, you must have the Writer service role or higher.
Configure storage
Before you can start evaluating your resources for compliance, you must configure a Cloud Object Storage bucket where the service can forward your results data for long-term storage. For more information about bucket requirements, see Storing and processing data in Security and Compliance Center.
To connect your Cloud Object Storage bucket, you can use the Security and Compliance Center UI.
- In the Security and Compliance Center navigation, click Settings.
- On the Storage tile, click Connect.
- Ensure that the service-to-service policy between Cloud Object Storage and Security and Compliance Center is configured. If a policy is already in place, this screen is not shown and you can skip to the next step.
- Select an instance of Cloud Object Storage.
- From the table, select the bucket that you want to use.
- Click Connect.
Create a scope
A scope is the grouping of resources that you want to evaluate. For help with creating a scope, see Targeting your resources.
Optional: Review available profiles
Before you start configuring your attachment, you can review the available profiles and compare them to ensure that you're using the one that is best for your use case. You can use the Profiles tab of the Security and Compliance Center UI or read more about them in Available predefined profiles.
Evaluate your resources
To evaluate your resources, you must create an attachment. An attachment pairs the resources that you grouped as a scope with the profile that you want to evaluate them against.
-
In your instance of Security and Compliance Center, go to the Attachments page and click Create.
-
Provide a name and description for your attachment. Then, click Next.
Be sure that this is as descriptive as possible so that other members of your team can quickly find the information that they're looking for.
-
Select the profile that you want to evaluate. Then, provide the information for any of the configurable parameters that you want to adjust.
New attachments cannot be created on deprecated profile versions. Select the most recent version to use for your evaluation.
-
Click Next.
-
Select the scope that you want to target. Then, click Next.
The scopes that are available in this view are filtered only to those scopes that contain resources that can be evaluated against your selected profile. If you aren't seeing the scope that you created, select a different profile or adjust the resources included in your scope.
-
In the annotation section, add custom annotations to individual controls. These annotations are for reference only and do not affect the evaluation process. Then, click Next.
-
Define your scan settings.
- Select the Frequency at which you want your evaluation to be conducted.
- Configure notifications for failures that are identified.
- Click Next.
-
Review your selections. If everything looks correct, click Create.
When you create your attachment, a scan is scheduled. When the scan completes, your results are available in the Security and Compliance Center dashboard.
Next steps
Now that you've got an attachment up and running, you can choose to segment your scope or start creating custom profiles that are tailored to your use cases.