Getting Started
BMC Helix Cloud Security is a SaaS (software-as-a-service) solution that enables you to quickly identify risks in your IT resources. This section helps you to get started with the product as it describes the overview, architecture, and end-to-end process flows for some of the commonly used features in BMC Helix Cloud Security.
Quick start
This table provides an overview of the tasks that you need to perform to get started with BMC Helix Cloud Security.
Tasks | Documentation | Documentation |
---|---|---|
1. | Subscribe to a free trial. You can subscribe to a 14 day free trial for BMC Helix Cloud Security. | |
2. | Ensure that your environment meets the minimum system requirements. The computer on which any on-premises connector is downloaded must fulfill the following mininum requirements:
| |
3. | Onboard the connectors. You can download and configure one or more of the out-of-the-box connectors that are available in BMC Helix Cloud Security. To view an example of the process, see Walkthrough: Onboarding the AWS Cloud connector. In this example, a company has made a decision to monitor the compliance and security of their Amazon Web Services (AWS) accounts using BMC Helix Cloud Security. | |
4. | Run a scan on demand for a cloud connector. By default, your environment is scanned at a scheduled time interval. To run a scan on demand, go to the Manage Connectors page and click Evaluate Now against a connector. For example, if you have configured an AWS cloud connector, go to the connector and click Evaluate Now to view results on the dashboard. | |
5. | (On-premises only) Run the connector. Run any on-premises connector once you have downloaded the zip file. Unzip the file, and do one of the following:
| |
6. | Identify the resource violations. Next, after setting up and running the connector, you can access the dashboard to manage the data. You can view the violations that are generated due to deviations from the rule evaluation criteria. You can aggregate the results by violation or by resource. See and . To view an example of the process, see Walkthrough: Identifying CIS violations for AWS. In this example, a company is using Amazon Simple Storage Service (S3) to store and retrieve data. The company wants to use Cloud Security to ensure that the data in the buckets is properly secured. | |
7. | Remediate the violations. Finally, you want to identify and remediate the most critical violations. To view an example of this process, see Walkthrough: Remediating compliance violations. This walkthrough topic shows you how to initiate a remediation action for a compliance violation with CIS policies for AWS. |
Walkthroughs
For end-to-end process flows for commonly used features in BMC Helix Cloud Security, see Walkthroughs.
Key concepts
For understanding the architecture and the terms used throughout this documentation, see Key concepts.
Comments
Log in or register to comment.