Every hour, Barracuda Cloud Security Guardian scans your infrastructure for risks. It detects items which do not pass the standards in your policies. When it detects these failed items that need your attention, it highlights them on the Security Risks page.
You can think of this page as an inbox or a to-do list, where you can assess and address outstanding risks. The number of outstanding risks in your infrastructure displays in the menu pick for the Security Risks page. Navigate to the Security Risks page to assess the outstanding risks and either remediate them or suppress them.
Reviewing Security Risks
On the Security Risks page, the left panel displays outstanding risks – resources that have failed conditions in your policies – ranked from most to least severe, and grouped by cloud connection, security standard, and control. The number displayed for each entry in this list relates to the number of risks in that group.
Filtering Security Risks
Use the filters at the top of the page to choose certain values you want to include in the table on this page. This information on filtering applies to the Security Risks and Security Findings pages.
- Use the Search field to find a control title or description.
- Select specific settings in other search fields. Select All to select everything in that menu. Select None to clear all of the selections in that menu.
- After you make your selection for each field, either tab to the next field or click elsewhere on the screen to apply your section to the table.
- Sharing between pages – The filter settings you choose are shared between the Security Risks and Security Findings pages. When you switch between these pages, your filter settings are automatically applied. You can alter the filter settings or remove all filters by clicking Clear Filters.
- Bookmarking your filters – When you have set the filters you want to use, create a bookmark in your browser. When you open that bookmark, your filters are automatically applied.
- Sharing with a colleague – To share your filter settings with an colleague who has access to your account, copy the URL in the address bar of your browser and share it. When your colleague opens the link you sent, they will see that page with the same filters you selected.
As described above, scans are performed automatically every hour. If you choose, you can perform an on-demand scan at any time by clicking Scan . To refresh the results in your browser without scanning the system, click Refresh . You might want to perform an on-demand scan, for example, after you update your policies. If you make your policies more strict, you can expect to see a higher number of security risks on this page. If you make your policies more lenient, you can expect the number of risks to decrease.
Explore the risks in the right panel. Click a resource to see the details of the failure.
- Cloud Connection – The Azure or AWS Cloud Connection where the risk was located.
- Resource – The specific resource associated with your cloud connection; for example, a security group or database.
- Region – The geographic region where this resource is located.
- Resource Type – The type of resource; for example, a security group or database.
- Control – The specific security control where the resource failed.
- Severity – There are three levels of severity:
- High – Address these issues immediately.
- Medium – While not urgent, address these issues as soon as possible.
- Low – Address these issues as time allows.
- Result – All items on the Security Risks page display as Failed.
- Status – There are three potential status values:
- New – You have not taken action on this item.
- Suppressed – You suppressed this item. See below.
- First Observed – Time when this risk was first detected.
- Last Observed – Time when this risk was most recently detected.
- Updated – Time when an action was last taken on this risk, either by detection or by a user's action – like suppressing or remediating it.
- More Details – Toggle the arrow to see additional information for this risk.
Click a resource to view its details and take action.
For each resource, you have two options:
- Suppress – Click Suppress to change the Status for the Resource to Suppressed. To simplify the results on the Security Risks page, set the Show Suppressed slider to OFF to show only risks that you have not suppressed.
- Remediate – Click Remediate and follow the instructions to resolve the problem that is causing the risk. Note that the remediation instructions are the same for all resources in a group. The next time the system is scanned, the status for this risk will be Resolved.
After you resolve a risk, it is no longer available on the Security Risks page, but is still available on the Security Findings page.