BMC Helix Cloud Security enables you to view further details about resources.
To access the latest information about this topic and all Cloud Security releases, check out the Release notes and notices.
To open the Resources page, perform one of the following actions:
- From the Dashboard, click Resources on the navigation bar.
- From the Non Compliant Resources widget, click a section of the or the numeric/percentage area below the to display the Violations page with all filters set to the default states.
From the Resources page you can perform the following actions:
Customizing data on the Resources page
The Resources page shows details for specific resources that are evaluated by Cloud Security. For a selected resource, the report shows step-by-step evaluation details for each variable within a rule. You can use appropriate filters when generating the report to get an optimum data set.
The Resources page contains the following information:
- Scan Date: Displays the date when the resource was last scanned.
- Status/Resource Details: Depicts whether the resource evaluated successfully and resource name. Origin specifies the name of the target application on which the resource resides.
- Resource Type: Shows the type of the resource, for example, S3_BUCKETS, jar, and so on.
- Connector: Shows the connector associated with the selected resource.
- Policy: Shows the name of policy associated with a specific resource, for example, AWS CIS S3 Buckets, App Vulcanizer Policy, and so on.
- Age: Shows the time period for which the resource had been in the displayed status.
Actions available on the widget
From the Non Compliant Resources widget, click a section of theor the numeric/percentage area below the to display the Violations page with all filters set to the default states.
Actions available on the filter bar
You can perform the following actions on the filter bar:
Type a keyword of 3 or more characters in the Enter Search Keyword field to narrow down search, and then press Enter.
- Click the tiny inverted caret icon in the heading row of the grid to select one or more check boxes, and then click anywhere on the screen. These selections help you to further narrow down the search.
- Clear the retrieved results by clicking Clear Selected Items under the corresponding menu in the filter bar.
- Click the column header to sort by ascending or descending order for Scan Date, Status/Resource Details, Resource Type, Connector,Policy or Age.
- Click the link in the Status/Resource Details column to view additional details for the selected resource.
Viewing details of an evaluated resource
On the Resources page, click the link in the Status/Resource Details column corresponding to required resource to view additional details for that resource.
On the Resource Details page, you can view one or more policies associated with the resource (if any), the type of the resource, the origin of the resource, the type of connector associated with the resource and when it was last scanned.
Compliance History shows the timeline in which the resource has been in the state indicated.
The Policy Rules table shows the rules associated with the policies, their severity, age, and the status of the rule since it was last evaluated.
- Variable Details: Shows the variables and their corresponding values.
- Rule Results: Shows the conditions and their corresponding return values.
- Expression: Shows the JSON query used to evaluate the rule.
The following figure shows a sample Resource Details screen:
If you delete a resource from the endpoints such as AWS or Azure, the resource will be removed from BMC Helix Cloud Security four hours after the respective connector runs.
From the Resource Details page, you can enable remediation of violations to associated policy rules.
1. To enable remediation, first select the policy rule/rules that need to undergo remediation, then click on Remediate Violations.
2. A message will be displayed confirming the successful submission of remediation request.
Performing next steps
For additional information about remediation, see Remediating violations.
To remediate a violation by following a specific use case, see Walkthrough: Identifying CIS violations for AWS.