Skip to content

Release 2.0: Azure Compliance

Latest
Compare
Choose a tag to compare
@santhoshigorle santhoshigorle released this 06 Dec 22:40
· 9 commits to master since this release
3a4e582

What is released as a part of 2.0

Starting with Release 2.0, PacBot supports Multi Cloud Compliance (AWS & Azure). This enables us to see AWS & Azure Compliance in single place.

PacBot still runs on AWS Infrastructure, but now has the capability to collect data from AWS & Azure.
Users can see security-center/policy-compliance and custom polices in PacBot.

PacBot collects data for 25+ Azure Services, including computing, storage, databases, networking and Security Center services.

PacBot supports the following dashboards for visualizing Azure data

  • Azure Compliance Overview
  • Asset Overview
  • Asset Listing
  • Asset 360 view
  • Tagging
  • Policy Knowledgebase
  • Compliance Details
  • Omni Search

Azure Policies

50+ Azure policies are now included with PacBot. Details of these policies can be found here.

Installation Steps

PacBot utilizes Service Principals to enable Azure data collection. A Service Principal must be provisioned in each tenant to have read access to the services in subscriptions to be monitored.

To enable Azure Compliance in PacBot, configure the client ID and secret ID of the service principal in each tenant as follows:

  • Step1: Set ENABLE_AZURE = True in local.py
  • Sep2: Add Azure tenants as shown below
    AZURE_TENANTS = [
    {
    'tenantId': "t111",
    'clientId': "c111",
    'secretId': "s111"
    },
    {
    'tenantId': "t222",
    'clientId': "c222",
    'secretId': "s222"
    },
    ]

Additional Features

  • Upgraded to latest Terraform version(0.12) for PacBot installer.
  • Silent option to install PacBot without interactive input.
    1. User can now omit reading input from console by preconfiguring inputs in the local.py script.
    2. During install/destroy/redeploy, give optional parameter --silent to install silently.

Issues Closed:

#255
#252