Quickly identify & prioritise potential security vulnerabilities, and make sure you're compliant
In this article, you'll learn:
- How to use Hyperglance to find security & compliance issues
- How to create your own security & compliance rules
- How your security & compliance score is calculated
- How to review rule violations and the affected resources
Your Security & Compliance Overview
Hyperglance's Security & Compliance dashboard comes preloaded with over 150 security & compliance rules, covering a wide range of areas across both Azure & AWS.
Not only will our rules help you spot security vulnerabilities in real-time, but they'll also let you know when you aren't adhering to key frameworks (PCI DSS, NIST, HIPAA).
Our rules guide has more information on rules, including creating and managing them
Viewing Security & Compliance Rule Violations
Hyperglance will show your security & compliance rule violations in order of their priority (high to low), then by the number of resources (highest to lowest).
A pre-loaded rule's priority (i.e. high/medium/low) is set to match industry best-practices, where possible. We'd typically recommend that High Priority rule violations require immediate attention, but your organisation's policy and/or process might differ.
Use the priority filter, or labels, to help you focus on your most important issues:
Quickly see the search criteria behind a suggestion by hovering over its name:
Select a rule to see a detailed view of it, where you can see the associated resources, the full search criteria, or clone/edit the rule:
Create Custom Rules
If you can't see the rule you're after, it's an ideal time to use Hyperglance's powerful Advanced Search to create your own.
Make sure you label your new rule as Security and/or Compliance, and either High Priority, Medium Priority, or Low Priority. Once you've done that, it'll appear in your Security & Compliance dashboard, if/when the rule is violated.
Security & Compliance Score
Your score shows you the percentage of your security & compliance rules that are currently passing, i.e. not in violation: