Managing resources

BMC Helix Cloud Security enables you to view further details about resources.

To access the latest information about this topic and all Cloud Security releases, check out the Release notes and notices.

To open the Resources page, perform one of the following actions:

  • From the Dashboard, click Resources on the navigation bar.
  • From the Non Compliant Resources widget, click a section of the widget or the numeric/percentage area below the widget to display the Violations page with all filters set to the default states.

From the Resources page you can perform the following actions:

Customizing data on the Resources page

The Resources page shows details for specific resources that are evaluated by Cloud Security. For a selected resource, the report shows step-by-step evaluation details for each variable within a rule. You can use appropriate filters when generating the report to get an optimum data set.

The Resources page contains the following information:

  • Scan Date: Displays the date when the resource was last scanned.
  • Status/Resource Details: Depicts whether the resource evaluated successfully and resource name. Origin specifies the name of the target application on which the resource resides.
  • Resource Type: Shows the type of the resource, for example, S3_BUCKETS, jar, and so on.
  • Connector: Shows the connector associated with the selected resource.
  • Policy: Shows the name of policy associated with a specific resource, for example, AWS CIS S3 Buckets, App Vulcanizer Policy, and so on.
  • Age: Shows the time period for which the resource had been in the displayed status.  

Back to top

Actions available on the widget

From the Non Compliant Resources widget, click a section of the widget or the numeric/percentage area below the widget to display the Violations page with all filters set to the default states.

Actions available on the filter bar

You can perform the following actions on the filter bar:

  • Type a keyword of 3 or more characters in the Enter Search Keyword field to narrow down search, and then press Enter.

  • Click the tiny inverted caret icon  in the heading row of the grid to select one or more check boxes, and then click anywhere on the screen. These selections help you to further narrow down the search.
  • Clear the retrieved results by clicking Clear Selected Items under the corresponding menu in the filter bar.
  • Click the column header to sort by ascending or descending order for Scan Date, Status/Resource Details, Resource TypeConnector,Policy or Age
  • Click the link in the Status/Resource Details column to view additional details for the selected resource.

Back to top

Viewing details of an evaluated resource

On the Resources page, click the link in the Status/Resource Details column corresponding to required resource to view additional details for that resource.

On the Resource Details page, you can view one or more policies associated with the resource (if any), the type of the resource, the origin of the resource, the type of connector associated with the resource and when it was last scanned.

Compliance History shows the timeline in which the resource has been in the state indicated.

The Policy Rules table shows the rules associated with the policies, their severity, age, and the status of the rule since it was last evaluated.

Click the tiny caret icon  to view further details about a specific policy rule, and then click one of the following tabs:

  • Variable Details: Shows the variables and their corresponding values.
  • Rule Results: Shows the conditions and their corresponding return values.
  • Expression: Shows the JSON query used to evaluate the rule.

Click  to hide the details of a particular rule.

The following figure shows a sample Resource Details screen:


If you delete a resource from the endpoints such as AWS or Azure, the resource will be removed from BMC Helix Cloud Security four hours after the respective connector runs. 

Back to top

Remediating Violations

From the Resource Details page, you can enable remediation of violations to associated policy rules.

1. To enable remediation, first select the policy rule/rules that need to undergo remediation, then click on Remediate Violations.

2. A message will be displayed confirming the successful submission of remediation request. 

Performing next steps

For additional information about remediation, see Remediating violations.

To remediate a violation by following a specific use case, see Walkthrough: Identifying CIS violations for AWS.

Was this page helpful? Yes No Submitting... Thank you