AccuKnox CNAPP
Aug 16, 2024
Viewer and click Continue.
Click on “Done”
To create a “Key” click the created service account
Click Add Key and Create new key
Check the JSON file and create.
Note: The created JSON private key file will be downloaded to your local machine by default.
User Manual
www.accuknox.com 20
Getting Started GuideUser Manual - Getting Started Guide
2. From AccuKnox SaaS UI
Click settings -> Cloud Accounts
Click Add account
User Manual
www.accuknox.com 21
Getting Started GuideUser Manual - Getting Started Guide
Select the Cloud Account type to GCP and Click Next
Select the Labels and Tags and click Next
Note: If there are no labels and tags create new labels and tags via the settings
Fill in the Project ID, Client Email and Private Key then click Connect.
User Manual
www.accuknox.com 22
Getting Started GuideUser Manual - Getting Started Guide
Note: For Client Email Id copy the mail id from the Service Account > Details section
Check Settings → Cloud Accounts. You will see your cloud account is added successfully.
CWPP Prerequisites
Minimum Resource required
Deployments Resource usage Port Connection Type
KubeArmor CPU: 200 m, Memory: 200 Mi - -
Agents Operator CPU: 50 m, Memory: 50 Mi 8081 Inbound/Outbound
Discovery Engine CPU: 100 m, Memory: 100 Mi - -
User Manual
www.accuknox.com 23
Getting Started GuideUser Manual - Getting Started Guide
Deployments Resource usage Port Connection Type
Shared Informer CPU: 20 m, Memory: 50 Mi 3000 Inbound/Outbound
Agent
Feeder Service CPU: 50 m, Memory: 100 Mi 3000 Inbound/Outbound
Policy Enforcement CPU: 10 m, Memory: 20 Mi 443 Inbound/Outbound
These ports need to be allowed through the firewall.
User Manual
www.accuknox.com 24
Getting Started GuideUser Manual - Getting Started Guide
Cluster Onboarding
The cluster onboarding steps are the same for both managed and unmanaged clusters as follows:
Step 1: After signing up, the user will be taken to the CNAPP dashboard. Since there is no cluster or cloud
account onboarded, widgets will not have any data.
Step 2: Navigate to Manage Cluster from Settings Tab. From this page we can onboard the clusters running
in various cloud platforms like GCP,AWS and Azure. We can also onboard unmanaged clusters set up locally
in the on-premises environment or virtual machines. To onboard cluster select onboard now option.
Step 3: In this screen, give any name to the cluster that you are going to onboard now.
User Manual
www.accuknox.com 25
Getting Started GuideUser Manual - Getting Started Guide
Step 4: Onboarded Cluster without AccuKnox agents:
The onboarded cluster’s workload details will not be visible as we have not installed AccuKnox agents. So
next we will be installing AccuKnox agents.
Step 5: Installing KubeArmor and AccuKnox agents:
We are going to install KubeArmor and AccuKnox-agents to connect to the AccuKnox SaaS application.
Step 5.1: KubeArmor Installation:
KubeArmor:
User Manual
www.accuknox.com 26
Getting Started GuideUser Manual - Getting Started Guide
KubeArmor is a cloud-native runtime security enforcement system that restricts the behavior (such as
process execution, file access, and networking operation) of containers and nodes at the system level. With
KubeArmor, a user can:
Restrict file system access for certain processes
Restrict what processes can be spawned within the pod
Restrict the capabilities that can be used by the processes within the pod
KubeArmor differs from seccomp-based profiles, wherein KubeArmor allows to dynamically set the
restrictions on the pod. With seccomp, the restrictions must be placed during the pod startup and cannot
be changed later. KubeArmor leverages Linux Security Modules (LSMs) to enforce policies at runtime.
KubeArmor is installed using the following commands:
>> curl -sfL http://get.kubearmor.io/ | sudo sh -s -- -b /usr/local/bin
>> karmor install
User Manual
www.accuknox.com 27
Getting Started GuideUser Manual - Getting Started Guide
Step 5.2: AccuKnox-Agents installation:
After installing KubeArmor we are going to install AccuKnox Agents in the cluster.
AccuKnox Agents:
1. KubeArmor: KubeArmor is a cloud-native runtime security enforcement system that restricts the
behavior (such as process execution, file access, and networking operation) of containers and nodes at the
system level. KubeArmor dynamically set the restrictions on the pod. KubeArmor leverages Linux Security
Modules (LSMs) to enforce policies at runtime.
2. Feeder Service: It collects the feeds from KubeArmor and relays to the app.
3. Shared Informer Agent: It collects information about the cluster like pods, nodes, namespaces etc.,
4. Policy Discovery Engine: It discovers the policies using the workload and cluster information that is
relayed by a shared informer Agent.
User Manual
www.accuknox.com 28
Getting Started GuideUser Manual - Getting Started Guide
AccuKnox Agents can be installed using the following command:
helm repo add accuknox-agents https://accuknox-agents-
dev:h47Sh4taEs@artifactory.accuknox.com/repository/accuknox-agents
helm repo update
helm upgrade --install agents-operator accuknox-agents/agents-operator \
--set props.tenant_id="399" \
--set props.workspace_id="399" \
--set props.cluster_name="gke-cluster" \
--set props.CLUSTER_NAME="gke-cluster" \
--set props.cluster_id="1814" \
--set props.helm_repo="accuknox-agents" \
--set props.helm_repo_url="https://accuknox-agents-
dev:h47Sh4taEs@artifactory.accuknox.com/repository/accuknox-agents" \
--set props.docker_repo_host="artifactory.accuknox.com" \
--set props.docker_repo_username="accuknox-agents-image" \
--set props.docker_repo_password="SjnnJxs3fk" \
--create-namespace -n accuknox-agents
Note: In the above command workspace_id,cluster_name,tenant_id is specific to this example, and it will
vary based on the cluster
Step 6: After installing all the AccuKnox agents the cluster is onboarded successfully into the SaaS
application. We can see the workload details of the onboarded cluster by Navigating to Inventory->cloud
Workloads option
User Manual
www.accuknox.com 29
Getting Started GuideUser Manual - Getting Started Guide
Asset Inventory
Cloud Assets
How to find a particular asset
First navigate to the Assets screen under Inventory:
First navigate to the Assets screen under Inventory:
User Manual
www.accuknox.com 30
Getting Started GuideUser Manual - Getting Started Guide
Now, if the name of the Asset is known, we can use the search bar to search for the Asset:
Or if the name is not known but the Asset type is known, the Filter by Asset drop down can be used
to filter the assets list. The search functionality can also be used on the filtered result:
User Manual
www.accuknox.com 31
Getting Started GuideUser Manual - Getting Started Guide
User Manual
www.accuknox.com 32
Getting Started GuideUser Manual - Getting Started Guide
How to group assets
Select the assets to be grouped in the Assets screen:
Click on the Add to group button on the top right:
In the pop-up that follows, create a new group, or add to an existing group:
User Manual
www.accuknox.com 33
Getting Started GuideUser Manual - Getting Started Guide
After entering a name for the group or selecting an existing group, click on Save to finish adding the
assets to a group:
Now, filtering by group allows us to see only the assets that were added to the group:
How to search asset by label
To find all the assets that have a particular label, select the label from the Filter by Label drop
down in the Assets screen:
User Manual
www.accuknox.com 34
Getting Started GuideUser Manual - Getting Started Guide
To further refine the results, we can use the search bar or add additional filters such as Assets
Cloud Workload
How to find graph view of clusters
Navigate to Cloud Workloads screen under Inventory to view the clusters that have been
onboarded:
User Manual
www.accuknox.com 35
Getting Started GuideUser Manual - Getting Started Guide
How to find list view of clusters
Click on the LIST option in the top right of the Cloud Workloads screen to get a list view of all the
clusters
The view can be freely switched between LIST and GRAPH as required
How to find details on cluster
Clicking on any of the clusters in the Cloud Workloads screen gives more information about the
cluster:
Click on View Pods to view the Pods present in the cluster classified according to the namespaces
they are present in:
User Manual
www.accuknox.com 36
Getting Started GuideUser Manual - Getting Started Guide
Double click on the pods to view the containers present in them. Select any container to view more
details:
Notice the Hierarchical structure above: Clusters > Pods > Containers. Clicking on any of them allows
navigation through the different screens.
Navigate back to the Clusters screen and select a cluster and then click on View Nodes. In the nodes screen,
we can view the nodes used by the cluster. Selecting a node gives more information about it:
User Manual
www.accuknox.com 37
Getting Started GuideUser Manual - Getting Started Guide
We can also double click on the node to view the Pods running in them
View Policies can be clicked to jump to the Policies screen to show the policies for the selected
cluster or pod:
User Manual
www.accuknox.com 38
Getting Started GuideUser Manual - Getting Started Guide
Misconfigurations
Where to find misconfigurations
Asset Detail Page
Once we have onboard the Cloud Account, we can navigate to the Inventory → Asset page where we can
see the List of Assets with vulnerabilities.
From the Asset listing click any Asset for the Asset Details.
User Manual
www.accuknox.com 39
Getting Started GuideUser Manual - Getting Started Guide
Scroll down for the Findings
Where you can see the Risk Factor for the particular Findings.
Issue Page
Navigate to Vulnerabilities screen under Issues and select an Asset from the drop down at the top
to view all misconfigurations associated with the Asset:
You can also type in the Assets drop down to search for a particular Asset
How to group by Asset, say s3 and find misconfiguration
User Manual
www.accuknox.com 40
Getting Started GuideUser Manual - Getting Started Guide
Step 1 : In the Assets screen under Inventory, filter by Assets to view only the S3 buckets:
Step 2 : Select all and Add to a group by clicking the Add to group button:
Step 3: Click on Save
User Manual
www.accuknox.com 41
Getting Started GuideUser Manual - Getting Started Guide
Step 4 : Click non Issues -> Vulnerabilities and select the group that was created from the drop down:
Step 5: To view the Grouped S3 bucket details, click on the group by option and select Asset:
Step 6: Now, the list of s3 buckets with any misconfigurations associated with them can be seen
User Manual
www.accuknox.com 42
Getting Started GuideUser Manual - Getting Started Guide
Step 7: Click on any of them to get more details
Similarly, we can use only the group by option to view all the misconfigurations grouped together for each
Asset.
How to group by findings
1. Goto Issues tab, click on Vulnerabilities section
User Manual
www.accuknox.com 43
Getting Started GuideUser Manual - Getting Started Guide
2. Navigate to Group by filter.
Click on it and choose Findings
User Manual
www.accuknox.com 44
Getting Started GuideUser Manual - Getting Started Guide
Now, you can see that similar findings are grouped. On clicking the arrow button in
the findings list, you will be able to view all the assets it is found in
How to group by criticality and Status
1. Goto Inventory tab, click on Assets section
2. Scroll down and click on the particular asset for which misconfiguration need to be viewed
User Manual
www.accuknox.com 45
Getting Started GuideUser Manual - Getting Started Guide
You will land on the page as shown below. Scroll down and navigate to Findings sections
User Manual
www.accuknox.com 46
Getting Started GuideUser Manual - Getting Started Guide
Navigate to the Risk Factor filter and choose the severity level.
Now, you can find the findings as per the criticality level as shown below
User Manual
www.accuknox.com 47
Getting Started GuideUser Manual - Getting Started Guide
Navigate to the Group by filter and choose Status.
Now, you can view the findings grouped by the status, such as active and accepted risk
User Manual
www.accuknox.com 48
Getting Started GuideUser Manual - Getting Started Guide
How to create a ticket
Goto Inventory tab, click on Assets section
User Manual
www.accuknox.com 49
Getting Started GuideUser Manual - Getting Started Guide
a. Scroll down and click on the particular asset for which misconfiguration need to be viewed
b. You will land on the page as shown below. Scroll down and navigate to Findings sections.
c. Select the check mark behind the Findings for which ticket needs to be created.
User Manual
www.accuknox.com 50
Getting Started GuideUser Manual - Getting Started Guide
Select the desired ticket configuration by which ticket will be created (Create a ticket configuration if it
does not exist already)
d. Choose the Priority from the dropdown.
User Manual
www.accuknox.com 51
Getting Started GuideUser Manual - Getting Started Guide
1. Edit the Ticket Title and Ticket Description, as required.
2. Click on the Create button at the top right corner.
You can see the tickets were created successfully.
User Manual
www.accuknox.com 52
Getting Started GuideUser Manual - Getting Started Guide
You can manage the created tickets in the Ticket Summary section, under the Remediation tab.
Issues/Vulnerabilities
Group findings by source and severity
AccuKnox automatically scans assets with the help of various open-source tools. It uses tools like Clair,
Trivy, CLOC, Fortify, Snyk, SonarQube, Cloudsploit, Kube Bench, and various other open-source tools for
Scanning.
Findings can be grouped according to the tools that were used to do the scan by selecting the “Data Type”
option from the “Group By” drop down in the Vulnerabilities screen.
User Manual
www.accuknox.com 53
Getting Started GuideUser Manual - Getting Started Guide
Users can further filter the findings with respect to their Risk factor so that they can have a view of the
most critical findings from each tool being used.
How to group by Findings and severity
When resolving and patching vulnerabilities it is important to tackle the findings that are most abundant
and most severe first. Users can use the Group by Findings feature to look for the vulnerabilities or
misconfiguration that exist in large no. of assets and prioritize them accordingly.
User Manual
www.accuknox.com 54
Getting Started GuideUser Manual - Getting Started Guide
Further users can select the Risk Factor to filter the findings based on their severity. This again narrows the
findings that need to be remediated.
How to group by Asset and severity
Users can have an Asset wise view of the findings. Grouping by assets, groups the vulnerabilities or
misconfigurations together with respect to the asset with which they are associated.
User Manual
www.accuknox.com 55
Getting Started GuideUser Manual - Getting Started Guide
If coupled with the Risk factor filter, users can have a view of the most critical assets i.e., the assets that
have the most no. of critical findings.
User Manual
www.accuknox.com 56
Getting Started GuideUser Manual - Getting Started Guide
How to create automated tickets in Findings and Asset grouping
AccuKnox enables customers to manage vulnerabilities/findings through auto-creation of tickets on bulk of
security findings of similar kind. To create tickets, select a set of findings, select the ticketing configuration,
and click create ticket.
Similarly, the same steps can be followed for creating tickets in asset groupings, click on the desired asset
and scroll down to the vulnerabilities section and do the steps.
How does registry scan happen?
AccuKnox CSPM tool provides registry scan where the user can onboard their Docker Hub, Nexus, GCR, and
ECR registries. Once the registry is onboarded, the scanning of the registry starts automatically in the
background. After the scanning is completed, the findings will be populated in the registry scan dashboard.
Registry Onboarding:
Step 1: To onboard a registry user needs to navigate to Issues->Registry Scan.
User Manual
www.accuknox.com 57
Getting Started GuideUser Manual - Getting Started Guide
Step 2: The user needs to select Add Registry option from the above screen. When a user clicks Add
Registry, they will be directed to a new screen to add registry details.
Step 3: User can onboard Nexus, GCR,ECR, DockerHub Registry by giving necessary details.
User Manual
www.accuknox.com 58
Getting Started GuideUser Manual - Getting Started Guide
Step 4: After giving necessary details, the user needs to test connection and save the registry
Step 5: Once the user clicks the save option registry will be added and scanning will be done in the
background. After the scan is complete the findings data will be populated.
User Manual
www.accuknox.com 59
Getting Started GuideUser Manual - Getting Started Guide
How to interpret Registry scan results
After the scan is complete, the scan data and findings will be populated into the screen. In this screen the
user will be getting information like no. of images scanned and risk associated with the images. Risks are
classified as Critical, High, Medium, Low.
What is Risk Based Prioritization?
In this section, users will be given a comprehensive risk analysis that is found in their onboard
environment. The risks that are identified are classified as High to critical based on the severity of those
User Manual
www.accuknox.com 60
Getting Started GuideUser Manual - Getting Started Guide
risks. Users will get details about the risks associated with images, and their CVSS scores identified based
on which source and severity of the risk.
When a user clicks on the risk from the list, they will be getting more details related to the risks like the
package associated with the risk. It also gives details related to the risks, the CVSS score of the risk, and the
associated image where the risk is present.
User Manual
www.accuknox.com 61
Getting Started GuideUser Manual - Getting Started Guide
Baseline
How to create a Baseline out of a data source
AccuKnox’s Baseline is an approach to detect drift in configuration from the conformance suite from
multiple ‘data sources’ that AccuKnox and that can be associated to a specific ‘asset’ or ‘group’ of assets. It
is a golden benchmark that is used to detect any change in compliance behavior proactively.
To create a baseline, follow these steps:
Step 1: Head to the Baselines page and click on add baseline
Step 2: Provide a name , select the source, and select the bias for your baseline and add a label for your
baseline
Step 3: Finally add the audit files by clicking on add, these files contain the compliance analysis from
different cloud accounts.
User Manual
www.accuknox.com 62
Getting Started GuideUser Manual - Getting Started Guide
Now you can see the compliance analysis by clicking on the baseline that you created
User Manual
www.accuknox.com 63
Getting Started GuideUser Manual - Getting Started Guide
How to compare two baselines
Once you have created a baseline for your cloud infrastructure, to ensure continuous compliance you can
create another baseline and compare them to see if there is any drift in the configuration between your
past baseline and your current baseline.
To compare your baselines, select multiple baseline baselines and click on compare baselines to see the
comparison.
The comparison will look like following
User Manual
www.accuknox.com 64
Getting Started GuideUser Manual - Getting Started Guide
Compliance
AccuKnox helps you to review your cloud infrastructure health and compliance posture. AccuKnox also
helps you to generate reports that contain summary and detailed assessment of vulnerability/findings and
compliance risks in your cloud infrastructure or in applications.
How to get Compliance for Cloud Assets
Each baseline is a set of compliance checks for configuration of your cloud infrastructure against
various benchmarks and frameworks.
Source selection while creating baselines lets you control the framework or benchmark you want
analysis against, e.g., CloudSploit provides PCI DSS, HIPPA and CIS compliance analysis.
CSPM Dashboard displays the compliance score for different frameworks for each cloud account
onboarded.
User Manual
www.accuknox.com 65
Getting Started GuideUser Manual - Getting Started Guide
How to get Compliance for Cloud Workload
AccuKnox leverage KubeArmor to harden your workload by enforcing hardening policies
These hardening policies are based on different compliance frameworks like NIST, CIS, MITRE etc.
When these policies get enforced and we get the logs based on these policies, then the compliance
analysis can be seen from CWPP Dashboard.
App Behavior
Application Behavior of the cluster workloads that are onboarded to the AccuKnox Saas are collected with
help of KubeArmor and the AccuKnox Agents that are installed as Daemon sets in the cluster. The
information is collected at the pod level granularity. So that the users can get information about each pod
that is running in each namespace. Application behavior of the cluster workloads are given in two ways,
one is the list view and other is the Graphical view.
How to interpret network graph
Let us understand this by following use-case example - Auditing Application Behavior of MySQL
application
1. Install workload:
sh kubectl apply -f
https://raw.githubusercontent.com/kubearmor/KubeArmor/main/examples/wordpress-
mysql/wordpress-mysql-deployment.yaml
User Manual
www.accuknox.com 66
Getting Started GuideUser Manual - Getting Started Guide
2. Showing App behavior screen in the context of the wordpress-mysql application. To see the
Application Behavior user must Navigate to the Runtime Protection->App Behavior section. Then
click on the Cluster and Namespace and pod from the filters to see the Application Behavior.
Network Graph: This view gives the graphical representation of Ingress and Egress traffic that are
occurring in the Pod. When we click on the connections, we can get a clear view of the traffic type
and port details.
File Observability: This view gives details about the files that are getting accessed in the pod.
User Manual
www.accuknox.com 67
Getting Started GuideUser Manual - Getting Started Guide
User Manual
www.accuknox.com 68
Getting Started GuideUser Manual - Getting Started Guide
Process Observability: This view gives the details of Processes that are currently running in the Pod.
Network Observability: The network observability can also be seen in the list here you can see the
details of ingress and egress traffic in the list view.
User Manual
www.accuknox.com 69
Getting Started GuideUser Manual - Getting Started Guide
How to see App Behavior Telemetry
To see the contextual information about the File and Network and Process observability user needs
to navigate to the Runtime Protection->App Behavior Section.
File Observability Telemetry: To see the file observability related telemetry user needs to click the
list view and select file observability part and click on any of the file events to see the Telemetry
User Manual
www.accuknox.com 70
Getting Started GuideUser Manual - Getting Started Guide
Process Observability Telemetry: To see the process observability related telemetry user needs to
click the list view and select process observability part and click on any of the process events to see
the Telemetry
Network observability: To see the Network observability related telemetry user needs to click the list
view and select Network observability part and click on any of the Network events to see the
Telemetry
User Manual
www.accuknox.com 71
Getting Started GuideUser Manual - Getting Started Guide
Runtime Protection w/ Policy Management
How to understand discover policies
Auto Discovered Policies are generated based on the Application Behavior. AccuKnox Runtime Security
Engine KubeArmor when deployed as agent will model the default application behavior of the workload
and produces the Auto discovered policies.
File access behavior-based policies: Based on the files that are accessed in pod, the Auto discovered
system policies are generated. To view that policy user must navigate to Runtime Protection->policies
section. Then click on the cluster and pod for which we want to see the auto-discovered policies.
Process access behavior-based policies: Based on the process that are running in pod, the Auto
discovered system policies are generated. To view that policy user must navigate to Runtime
Protection->policies section. Then click on the cluster and pod for which we want to see the auto-
discovered policies.
User Manual
www.accuknox.com 72
Getting Started GuideUser Manual - Getting Started Guide
User Manual
www.accuknox.com 73
Getting Started GuideUser Manual - Getting Started Guide
Network access behavior-based Policies: Based on the Network connections that are Ingress and
egress connections that are present in pod, the auto discovered system policies are generated. To
view that policy user must navigate to the Runtime Protection->policies section. Then click on the
cluster and pod for which we want to see the auto-discovered policies.
User Manual
www.accuknox.com 74
Getting Started GuideUser Manual - Getting Started Guide
How to understand Hardening policies
One of the methods to achieve a zero-trust environment is Application Hardening. KubeArmor is a security
solution for the Kubernetes and cloud native platforms that helps protect your workloads from attacks and
threats. It does this by providing a set of hardening policies which are block-based policies. It is based on
industry-leading technical conformance to standard compliance and attack frameworks such as CIS, MITRE,
NIST-800-53, and STIGs. These policies are designed to help you secure your workloads in a way that is
compliant with these frameworks and recommended best practices.
Let us understand by taking a use-case example - Disallowing any binaries execution to prevent from
RCE Vulnerability
1. Select your cluster and namespace from this Policies screen. We will be getting a list of hardening policies
for the selected Namespace.
2. Selecting the below hardening policy to apply. This policy disallows execution of any of the Package
management tools inside the pod. This policy is generated based on the Compliance Frameworks like
NIST, NIST 800
User Manual
www.accuknox.com 75
Getting Started GuideUser Manual - Getting Started Guide
User Manual
www.accuknox.com 76
Getting Started GuideUser Manual - Getting Started Guide
3. Select this policy and click on the apply option
4. After applying policy goes into active state.
User Manual
www.accuknox.com 77
Getting Started GuideUser Manual - Getting Started Guide
5. After applying this policy, the attacker might not be able to install any of the packages for performing
Remote code execution attack.
How to Audit application and get alerts for that
AccuKnox Runtime Security Engine KubeArmor can be used for auditing the application with the help
of audit-based security policies. Let us consider the following policy
This policy helps to audit the access to /var/lib/mysql/ folder. If any modification or any contents of
this folder is read user will be intimated with alerts.
Applying the Audit base policy from SaaS
User Manual
www.accuknox.com 78
Getting Started GuideUser Manual - Getting Started Guide
Now if we try to read the contents of this /var/lib/mysql folder running in a mysql pod by exec into
the pod.
User Manual
www.accuknox.com 79
Getting Started GuideUser Manual - Getting Started Guide
We can see the Audit based alert in the Monitoring/Logging Section from AccuKnox SaaS as below
When do we say policies are stable?
AccuKnox Runtime Security Engine KubeArmor will discover the policies based on the Application
Behavior. If the Application behavior changes the Policies generated will also be updated.
When the policy created date or updated date does not change for some days then we can say that
the policy which was discovered is stable. For example, consider the following policy
User Manual
www.accuknox.com 80
Getting Started GuideUser Manual - Getting Started Guide
The above auto discovered policy has not changed for more than a month. This policy can be called a
stable policy as it did not get any updates or changes.
What if something changes in Application??
AccuKnox Runtime Security Engine KubeArmor will discover the policies based on the Application
Behavior. If the Application behavior changes the Policies generated will also be updated.
For example, consider the following auto discovered policy
User Manual
www.accuknox.com 81
Getting Started GuideUser Manual - Getting Started Guide
In the above policy there are some changes that are detected after the initial policy discovery due to
changes in application behavior. Those changes are highlighted.
User Manual
www.accuknox.com 82
Getting Started GuideUser Manual - Getting Started Guide
If the user is satisfied with the changes, they can accept the change by clicking on the update button
User Manual
www.accuknox.com 83
Getting Started GuideUser Manual - Getting Started Guide
After the user clicks the update, the policy will be updated.
How to create a custom Policy
File restriction Policy
To create a file restriction based custom policy user must navigate to Runtime Protection->Policies
section.
To create the policy user needs to click on the create policy option
User Manual
www.accuknox.com 84
Getting Started GuideUser Manual - Getting Started Guide
Now user has two options either to upload the yaml file or to create the policy from policy editor tool
Now upload the file access policy yaml from your system. After it is uploaded some the columns in
the left side will be prefilled and user needs to select the cluster and namespace where the policy
needs to apply and click save.
User Manual
www.accuknox.com 85
Getting Started GuideUser Manual - Getting Started Guide
Now to save the policy user needs to click the save to workspace option
After that policy will be saved to the workspace.
User Manual
www.accuknox.com 86
Getting Started GuideUser Manual - Getting Started Guide
Network access Policy
To create a Network access policy restriction based custom policy user must navigate to Runtime
Protection->Policies section.
To create the policy user needs to click on the create policy option
User Manual
www.accuknox.com 87
Getting Started GuideUser Manual - Getting Started Guide
In this screen for Network Policy creation user needs to select the Network policy editor tool
Now upload the Network policy yaml from your system by clicking the upload yaml option. After it is
uploaded some the columns on the left side will be prefilled and user needs to select the cluster and
namespace where the policy needs to apply and click save.
Now to save the policy user needs to click the save to workspace option
User Manual
www.accuknox.com 88
Getting Started GuideUser Manual - Getting Started Guide
After that policy will be saved to the workspace.
Process block restriction Policy
To create a Process access restriction based custom policy user must navigate to Runtime Protection-
>Policies section.
To create the policy user needs to click on the create policy option
User Manual
www.accuknox.com 89
Getting Started GuideUser Manual - Getting Started Guide
Now user has two options either to upload the yaml file or to create the policy from policy editor tool
Now upload the process block policy yaml from your system. After it is uploaded some the columns
on the left side will be prefilled and user needs to select the cluster and namespace where the policy
needs to apply and click save.
User Manual
www.accuknox.com 90
Getting Started GuideUser Manual - Getting Started Guide
Now to save the policy user needs to click the save to workspace option
After that policy will be saved to the workspace.
User Manual
www.accuknox.com 91
Getting Started GuideUser Manual - Getting Started Guide
How to enforce Policies and see anomalies
We can apply any of the Auto Discovered, Hardening or custom policies and see the anomalies
getting detected using the Monitoring and Logging section.
Let us consider the WordPress- MySQL application. In the MySQL application, certain folders will be
having certain critical data which can be allowed to access but not modified. So, using our AccuKnox
hardening policy we are going to prevent the modification of contents inside these critical folders.
Before applying the policy: Currently, any attacker who gets access to the bash or shell of the MySQL
pod can modify the contents of the sbin folder by creating a new file and editing the old files.
User Manual
www.accuknox.com 92
Getting Started GuideUser Manual - Getting Started Guide
Now we are going to prevent this using AccuKnox CWPP Solution.
Step 1: Navigate to the Runtime Protection-> Policies and select the cluster and namespace where
the WordPress-MySQL application is deployed.
User Manual
www.accuknox.com 93
Getting Started GuideUser Manual - Getting Started Guide
Step 2: In the screen select the hardening policies in the policy filter section to view the hardening
policies related to the WordPress-MySQL application.
Step 3: Click on the MySQL file integrity hardening policy from the list of policies to see the policy
User Manual
www.accuknox.com 94
Getting Started GuideUser Manual - Getting Started Guide
The policy is allowing users to access the critical folders, but it is blocking the write or modify access
by whitelisting only read access.
apiVersion: security.kubearmor.com/v1
kind: KubeArmorPolicy
User Manual
www.accuknox.com 95
Getting Started GuideUser Manual - Getting Started Guide
metadata:
name: harden-mysql-file-integrity-monitoring
namespace: wordpress-mysql
spec:
action: Block
file:
matchDirectories:
- dir: /sbin/
readOnly: true
recursive: true
- dir: /usr/bin/
readOnly: true
recursive: true
- dir: /usr/lib/
readOnly: true
recursive: true
- dir: /usr/sbin/
readOnly: true
recursive: true
- dir: /bin/
readOnly: true
recursive: true
- dir: /boot/
readOnly: true
recursive: true
message: Detected and prevented compromise to File
integrity
selector:
matchLabels:
app: mysql
severity: 1
tags:
- NIST
- NIST_800-53_AU-2
- NIST_800-53_SI-4
- MITRE
- MITRE_T1036_masquerading
- MITRE_T1565_data_manipulation
User Manual
www.accuknox.com 96
Getting Started GuideUser Manual - Getting Started Guide
Step 4: To apply this policy, select the policy checkbox and click Activate option
Step 5: Now the policy is active and applied on the cluster
Step 6: If any attacker now tries to modify the content of the critical folders it will be blocked.
User Manual
www.accuknox.com 97
Getting Started GuideUser Manual - Getting Started Guide
Step 7: To see the logs Navigate to the Monitoring/logging->logs
How to perform bulk operation on applying policies
AccuKnox SaaS supports applying multiple policies at one time. To perform this user must navigate to
the Runtime Protection->Policies Section.
From the Filters shown in the Screen user must select the Cluster and Namespace for which they are
going to apply multiple policies
User Manual
www.accuknox.com 98
Getting Started GuideUser Manual - Getting Started Guide
User Manual
www.accuknox.com 99
Getting Started GuideUser Manual - Getting Started Guide
To apply multiple policies in single go, select all policies from the screen and click Activate button
Now after activating all the policies, they will be made active and applied in the cluster.
Integrations
Integrate SIEM tools
SPLUNK
AWS Cloud Watch
User Manual
www.accuknox.com 100
Getting Started GuideUser Manual - Getting Started Guide
Rsyslog
Splunk
Splunk Integration:
Splunk is a software platform to search, analyze, and visualize machine-generated data gathered from
websites, applications, sensors, and devices.
AccuKnox integrates with Splunk and monitors your assets and sends alerts for resource misconfigurations,
compliance violations, network security risks, and anomalous user activities to Splunk. To forward the
events from your workspace you must have Splunk Depolyed and HEC URL generated first for Splunk
Integration.
Integration of Splunk:
a. Prerequisites:
Set up Splunk HTTP Event Collector (HEC) to view alert notifications from AccuKnox in Splunk. Splunk HEC
lets you send data and application events to a Splunk deployment over the HTTP and Secure HTTP (HTTPS)
protocols.
To set up HEC, use instructions in Splunk documentation. For source type,_json is the default; if you specify
a custom string on AccuKnox, that value will overwrite anything you set here.
Select Settings > Data inputs > HTTP Event Collector and make sure you see HEC added in the list and that
the status shows that it is Enabled.
b. Steps to Integrate:
Go to Settings->Integration.
Click Integrate now on Splunk.
User Manual
www.accuknox.com 101
Getting Started GuideUser Manual - Getting Started Guide
Enter the following details to configure Splunk.
Select the Splunk App: From the dropdown, Select Splunk Enterprise.
Integration Name: Enter the name for the integration. You can set any name. e.g., sh Test Splunk
Splunk HTTP event collector URL: Enter your Splunk HEC URL generated earlier.e.g., sh
https://splunk-xxxxxxxxxx.com/services/collector
Index: Enter your Splunk Index, once created while creating HEC. e.g., sh main
Token: Enter your Splunk Token, generated while creating HEC URL. e.g., sh x000x0x0x-0xxx-0xxx-
xxxx-xxxxx00000
Source: Enter the source as http: sh Kafka
Source Type: Enter your Source Type here, this can be anything and the same will be attached to
the event type forwarded to Splunk. e.g., sh _json
Click Test to check the new functionality, You will receive the test message on the configured slack
channel. e.g.,sh Test Message host = xxxxxx-deployment-xxxxxx-xxx00 source = http:kafka
sourcetype = trials
Click Save to save the Integration. You can now configure Alert Triggers for Slack Notifications.
User Manual
www.accuknox.com 102
Getting Started GuideUser Manual - Getting Started Guide
AWS CloudWatch
AWS CloudWatch Integration
Navigate to Settings->Integrations. Choose "AWS CloudWatch" services and click the Integrate Now button.
Integration of Amazon CloudWatch:
a. Prerequisites
AWS Access Key / AWS Secret Key is required for this Integration.
[Note]: Please refer to this link to create an access key link
b. Steps to Integrate:
Go to Channel Integration URL
Click the Integrate Now button -> AWS CloudWatch
Here you will be able to see these entries:
Integration Name: Enter the name for the integration. You can set any name.
AWS Access Key: Enter your AWS Access Key here.
AWS Secret Key: Enter your AWS Secret Key here.
Region Name: Enter your AWS Region Name here.
User Manual
www.accuknox.com 103
Getting Started GuideUser Manual - Getting Started Guide
Once you fill in every field and then click the button this will evaluate whether your integration is
working or not.
Click the Save button.
c. Configuration of Alert Triggers:
On the Logs page, after choosing a specific log filter click on the ''Create Trigger'' button.
The below fields need to be entered with appropriate data:
Name: Enter the name of the trigger. You can set any name without special characters.
When to Initiate: The frequency of the trigger as Real Time /.
Status: Enter the severity of the trigger.
Search Filter Data: The filter log chosen is automatically populated here. This is optional.
Predefined queries: The list of predefined queries for this workspace is shown as default.
Notification Channel: Select the integration channel that needs to receive logs. This should be AWS
CloudWatch. (Note: Channel Integration is done on the previous step)
Save: Click on Save for the trigger to get stored in the database.
d. Logs Forwarding:
For each Enabled Trigger, please check the AWS platform to view the logs.
Based on Frequency (Real Time / Once in a Day / Week)
The Rule Engine matches the real-time logs against the triggers created.
Rsyslog
RSyslog Integration
To forward the events to RSyslog you must first set up the RSyslog Integration.
Integration of RSyslog:
a. Prerequisites:
A running RSyslog server.
Host name/IP, Port number, Transport type(TCP or UDP)
Note: To deploy the RSyslog server, follow RSyslog Documentation.
b. Steps to Integrate:
User Manual
www.accuknox.com 104
Getting Started GuideUser Manual - Getting Started Guide
Go to Settings → Integrations → CWPP(Tab).
Click integrate now on RSyslog.
Fill up the following fields:
Integration Name: Enter the name for the integration. You can set any name of your choice. e.g.,
Container Security Alerts
Server Address: Enter your RSyslog Server address here, IP address or fully qualified domain name
(FQDN) of the RSyslog server e.g.,rsyslog.mydomain.com or 35.xx.xx.xx
Port: The port number to use when sending RSyslog messages (default is UDP on port 514); you
must use the same port number. e.g., 514
Transport: Select UDP, or TCP as the method of communication with the RSyslog server
Click Test to check the new functionality, You will receive the test message on configured RSyslog
Server. -Test message Please ignore !!
Click Save to save the Integration. You can now configure Alert Triggers for RSyslog Events
User Manual
www.accuknox.com 105
Getting Started GuideUser Manual - Getting Started Guide
Integrate Notifications Tools
Slack
Slack
Slack Integration:
To send an alert notification via Slack you must first set up the Slack notification Channel.
Integration of Slack:
a. Prerequisites:
You need a valid and active account in Slack. After logging into your Slack channel, you must generate a
Hook URL.
Note: To generate a Hook URL follow the steps, Webhooks-for-Slack.
b. Steps to Integrate:
Go to Channel Integration.
Click Integrate now on Slack.
Fill up the following fields:
Integration Name: Enter the name for the integration. You can set any name. e.g., Container Security
Alerts
Hook URL: Enter your generated slack hook URL here. e.g.,
https://hooks.slack.com/services/T000/B000/XXXXXXX
User Manual
www.accuknox.com 106
Getting Started GuideUser Manual - Getting Started Guide
Sender Name: Enter the sender’s name here. e.g., AccuKnox User
Channel Name: Enter your slack channel name here. e.g., livealertsforcontainer
Click Test to check the new functionality, You will receive the test message on configured slack
channel. Test message Please ignore !!
Click Save to save the Integration. You can now configure Alert Triggers for Slack Notifications.
Integrate Ticketing Tools
Jira cloud
fresh service
Jira Integration
Integrate AccuKnox with Jira and receive AccuKnox alert notifications in your Jira accounts. With this
integration, you can automate the process of generating Jira tickets with your existing security workflow.
To set up this integration, you need to coordinate with your Jira administrator and gather the inputs
needed to enable communication between AccuKnox and Jira.
User Manual
www.accuknox.com 107
Getting Started GuideUser Manual - Getting Started Guide
Integration of JIRA:
a. Prerequisites
You need a Jira Site URL, Email, UserID & API token, and Project key for this integration.
To create a JIRA token go to https://id.atlassian.com/manage-profile/security/api-tokens, and click
on create an API token.
JIRA integration for CWPP:
Steps to Integrate:
Go to Channel Integration.
Click integrate now on JIRA
Enter the following details to configure JIRA.
Integration Name: Enter the name for the integration. You can set any name. e.g., Test JIRA
Site: Enter the site name of your organization. e.g., https://jiratest.atlassian.net/
User Email: Enter your Jira account email address here. e.g., jira@organisation.com
Token: Enter the generated Token here from https://id.atlassian.com/manage-profile/security/api-
tokens. .e.g., kRVxxxxxxxxxxxxx39
User ID: Enter your Jira user ID here. You can visit the people section and search your name to see
the User ID. For more details check here. e.g., 5bbxxxxxxxxxx0103780
User Manual
www.accuknox.com 108
Getting Started GuideUser Manual - Getting Started Guide
Project ID: Enter your Project key here, each project in an organization starts with some key value
and is case-sensitive. Breakdown of a Jira ticket to identify Project ID: https://[JIRA-
SITE]/browse/[PROJECT ID]-1414, e.g., DEVSECOPS
Issue Summary: Enter the summary for the JIRA tickets to be viewed in each JIRA ticket created. e.g.,
Issues generated from High Severity Incidents on the onboarded cluster.
Issue Type: You can choose from the dropdown. i.e., Story and Bug
Click Test to check if the entered details are being validated, If you receive Test Successful, you have
entered valid JIRA credentials.
Click Save to save the Integration.
JIRA integration for CSPM:
Steps to Integrate:
Go to Channel Integration -> CSPM.
Click on add the Connector and select JIRA Cloud
Enter the following details to configure JIRA.
Integration Name: Enter the name for the integration. You can set any name. e.g., Test JIRA
Site: Enter the site name of your organization. e.g., https://jiratest.atlassian.net/
User Email: Enter your Jira account email address here. e.g., jira@organisation.com
Token: Enter the generated Token here from https://id.atlassian.com/manage-profile/security/api-
tokens. .e.g., kRVxxxxxxxxxxxxx39
User Manual
www.accuknox.com 109
Getting Started GuideUser Manual - Getting Started Guide
Click on the Jira ticketing backend to add config. Here Enter the following details:
Configuration name: this name will be displayed under ticket configuration while creating tickets.
Default template: to specify the data that this configuration will be used for making tickets.
Project name: From the list of projects select the project where you want your tickets to be created.
Issue Type: You can choose from the dropdown.
Fill in the priority mapping according to your choice and press save.
You can now configure Alert Triggers for JIRA.
Freshservice
Freshservice Integration:
Integrate AccuKnox with Freshservice and receive AccuKnox alert notifications in your Freshservice
accounts. With this integration, you can automate the process of generating Freshservice “Problem alerts“
with your existing security workflow.
To set up this integration, you need to coordinate with your Freshservice administrator and gather the
inputs needed to enable communication between AccuKnox and Freshservice.
Integration of Freshservice:
a. Prerequisites
You need a Company domain, Email & API key (secret) for this integration.
User Manual
www.accuknox.com 110
Getting Started GuideUser Manual - Getting Started Guide
You can find your API key in profile settings in the right-side column.
b. Steps to Integrate:
Go to Channel Integration -> CSPM.
Click on Add the connector and select Freshservice
Enter the following details to configure Fresh Service.
Integration Name: Enter the name for the integration. You can set any name. e.g.,TestFreshservice
User Manual
www.accuknox.com 111
Getting Started GuideUser Manual - Getting Started Guide
Domain Name: Enter the site name of your organization as shown in your URL. e.g., for
https://accuknoxexample.freshservice.com/ enter the domain name as accuknoxexample.
User Email: Enter your Freshservice account email address here. e.g., freshservice@organisation.com
Secret: Enter the API key Here. This can be found in profile settings.
Click Save to save the Integration.
Click on the Freshservice ticketing backend to add configuration.
Here Enter the following details:
Configuration name: this name will be displayed under ticket configuration while creating tickets.
Default template: to specify the data that this configuration will be used for making tickets.
Issue Type: You can choose from the dropdown.
Fill in the priority mapping according to your choice and press save.
You can now configure Alert Triggers for Freshservice.
User Manual
www.accuknox.com 112
Getting Started GuideUser Manual - Getting Started Guide
Creating Ticket Configuration
To create a ticket configuration, navigate to Integrations under Settings and click on the CSPM tab.
This will show all the ticketing backends that have been integrated:
Click on one of the integrated Ticketing backends and click on Add Configuration button in the
subsequent screen:
Enter a name for the configuration and select a template for the ticket. The selected template will
make it available in the respective screen as a ticket configuration. Eg. Selecting Vulnerability will
make it available as a ticket configuration to select under Issues -> Vulnerabilities for creating tickets.
User Manual
www.accuknox.com 113
Getting Started GuideUser Manual - Getting Started Guide
Enter the relevant data in the remaining fields and click on Save. The ticket configuration is created
successfully
Integrate Registries
Registry
AccuKnox CSPM tool provides registry scan where the user can onboard their Docker Hub, Nexus,
GCR, and ECR registries. Once the registry is onboarded, the scanning of the registry starts
automatically in the background. After the scanning is completed, the findings will be populated in
the registry scan dashboard.
To Onboard Registry click here
User Manual
www.accuknox.com 114
Getting Started GuideUser Manual - Getting Started Guide
a. Amazon Elastic Container Registry:
Accuknox CSPM security tool scans images that are present in the onboarded Amazon Elastic
Container Registry and identifies any known vulnerabilities and risks associated with those images.
These are then categorized based on their severity. Users will be getting a comprehensive view of
these risks and vulnerabilities in the dashboard which can be remediated.
b. Google Container Registry:
Google Container Registry with images Once onboarded into the AccuKnox SaaS platform, the images
are scanned. The risks and vulnerabilities associated with these images are identified and shown in
the scan results. The vulnerabilities are classified based on the CVSS Scores.
c. Nexus Registry:
AccuKnox CSPM Security leverages various open-source scanning tools to scan the images present in
the onboarded Nexus Repository. It identifies the common vulnerabilities and exploits associated
with those images and risks. These Vulnerabilities and risks are classified based on their severity.
d. DockerHub Registry:
DockerHub Repositories can be integrated with AccuKnox SaaS. Once these registries are onboarded,
the images are scanned for vulnerabilities and risks. These findings are populated in the dashboard
with Critical, High, and low vulnerabilities.
User Manual
www.accuknox.com 115
Getting Started GuideUser Manual - Getting Started Guide
User Management
AccuKnox SaaS provides the ability to authenticate and authorize multiple users to access and utilize the
Saas platform. Inside the user management section user can create profiles for other users and these
profiles are displayed in the form of a list. From the list, users can View Permissions, Edit, Deactivate, and
delete user profiles.
Permission is given to users by assigning roles while creating a user profile. These roles are created in the
RBAC section. Deactivated users can be viewed under the Deactivated Users subsection.
Creating a user sends an invite to their email id, invites that are not yet accepted are present inside the
Pending Invites subsection.
Invite folks to the workspace
Inviting new users:
Step 1: we can invite a new user to the tenant by clicking on the Add user option provided on the screen. In
the below screen, new user details need to be given for inviting him to this tenant id.
Step 2: Fill in the necessary details for the user invite
User Manual
www.accuknox.com 116
Getting Started GuideUser Manual - Getting Started Guide
Step 3: After we click save, the new user will be getting a user invite email with username, password, and
sign in link to the mentioned email id
User Manual
www.accuknox.com 117
Getting Started GuideUser Manual - Getting Started Guide
Step 4: The user needs to sign in with the credentials provided in the email.
Step 5: After signing in, the user will be prompted to change the password.
User Manual
www.accuknox.com 118
Getting Started GuideUser Manual - Getting Started Guide
Step 6: Once the password is changed, the user will need to set MFA for his account using any
Authenticator Application.
Step 7: After successful login, the user will be directed to the Dashboard screen.
User Manual
www.accuknox.com 119
Getting Started GuideUser Manual - Getting Started Guide
Assign RBAC
The role-Based Access Control option gives the option of creating users with different roles. we can create
and manage roles that will be assigned to user profiles for their authorization. Users can select a set of
permissions for each role like access to the Dashboard, Inventory, Issues, Runtime Protection, Compliance,
Remediation, Monitors, and Settings. Roles can be created by clicking add roles or by cloning the existing
roles. Roles are of two types, default roles come prebuilt and cannot be edited or deleted, and all other
roles are custom roles.
User Manual
www.accuknox.com 120
Getting Started GuideUser Manual - Getting Started Guide
Create Roles and Assign Users
Steps:
Click on Add Role
Enter the name for Role along with it specify the role permission
User Manual
www.accuknox.com 121
Getting Started GuideUser Manual - Getting Started Guide
Click on Save
Navigate to User Management > Add User > Choose the role created
Send the send to the new user with custom role and permission
User Manual
www.accuknox.com 122
Getting Started Guide">