User Interface
Home Page
After signing in, users gain access to the home page of the Cloudneeti application.
- On the top of the page, the user can select the required License from the dropdown menu.
- Users can select from the required Cloud Account from the dropdown menu.
- Users can click on the User icon to sign out of the Cloudneeti application.
- The Tune icon opens a dropdown menu for configuring Cloud Account settings.
- Clicking on the Menu icon will remove the left menu completely in order to increase the visible area for the dashboards.
-
This collapse icon will narrow the left menu to icon level in order to increase the visible area for the dashboards. The left menu provides access to Dashboards (1), Views (2) and Configurations (3).
-
The menu item Dashboard brings the user to the Compliance, Security, Risk and Assets dashboards.
-
The menu item Cloud Security Best Practices provides access to a view of the complete list of cloud security best practices within the Cloudneeti application.
-
The menu items Cybersecurity Benchmarks, Laws and Regulations, and Industry Benchmarks provide access to views of individual compliance frameworks.
-
The Configurations menu item provides access to Features and Quotas, Integrations, Cloud Accounts, Users and Roles, and Security Policies.
-
The Audit logs menu provides an overview of the most recent audit logs. Every user transaction such as adding or removing users, downloading reports, and configurations changes.
-
The Documentation menu item redirects to the product documentation portal.
-
The Release Notes menu item redirects to the documentation portal with information about features and security policies added in the most recent product releases.
-
The Disclaimer states the legal disclaimer information about the product.
The following sections introduce each of these capabilities of Cloudneeti product.
Dashboards
The dashboards menu item navigates to three different dashboards: Compliance, Risk, and Assets. For more information please refer to Dashboards section.
Security Policies
The Cloud Security Best Practices view provides a list of all security policies within the Cloudneeti application and their compliance status. The status is displayed as number of resources that are adhering to the security policy standard out of the total number of resources. For more information please refer to Security Policies section.
Compliance Benchmarks
The Cybersecurity Benchmarks, Laws and Regulations, Industry Benchmarks section on the left menu can be expanded to select the required benchmark view. For more information please refer to Compliance Benchmarks section.
Configurations
The configurations section (1) on the left menu provides access to access to Features and Quotas, Integrations, Cloud Accounts, Users and Roles, and Security Policies. License Admin and Account Admin can review and update License level and Cloud Account level configurations.
Audit Logs
The Audit Log section provides an overview of the most recent audit logs. Every user transaction such as adding or removing users, downloading reports, and configurations changes.
Release Notes
The Release Notes (1) menu item redirects you to the Cloudneeti documentation portal.
-
Select Release Notes period
-
Select specific release number from Table of Contents
-
View the Release Notes for that specific release
Disclaimer
Click on Disclaimer (1) to view the legal terms of providing this security and compliance posture information.
Disclaimer: Security and compliance benchmarks provide the necessary standards to safeguard systems, software, and networks against today's evolving cyber threats. Cloudneeti application analyzes configurations of your cloud infrastructure and presents the security and compliance posture of your cloud implementation in form of dashboards, views and reports. The individual security policies and their mapping to various compliance controls are an interpretation of related cybersecurity benchmarks, laws and regulations, and industry specific compliance benchmarks. Information provided by Cloudneeti application cannot be interpreted as a guarantee of compliance.