How can we help?

Knowledge Base

  • General
  • Product
  • Service
  • Billing
  • Account
  • Popular articles

    Setup the AWS account for CyStack Cloud Audit

    Audit AWS is used for security audit of Amazon web services. To begin with, an AWS credential that has valid permissions is required.

    Below is steps to do that

    Create an AWS credential

    1. Login AWS Console with root permission

    2. Access IAM service and add users

    3. Select Access Type as Programmatic access
     

    4. In permission settings, select Attach existing policies directly then create a new policy

    5. Select tab JSON, then paste this content into the editor. As you can see, those permissions are just Get, Describe permissions. We don't require Create/Add/Delete permissions to secure your AWS account.

    6. Review and create policy

    7. Back to the Adding user screen, click the refresh button and search for the name of created policy, then tick this policy and go next steps

    8. Use the default value for next steps

    9. Create new user và store your Access key ID / Secret access key

     

    Create a new target in CyStack Cloud Security

    1. Access https://cloud.cystack.net/new-target to create a new target

    2. Enter your Access key and Secret key that are just created. Those values are encrypted and safely stored in CyStack Database.

    3. Access Dashboard and enable the Audit feature

    What is Target?

    In CyStack Cloud Security, we define that a Target is an object that needs to be secured. We currently support the following types of target:


    Website

    It represents a website or web application and is identified by its URL, e.g. https://cystack.net


    Server

    It represents a server or a list of servers and is identified by their domains, IP addresses or CIDR, e.g cystack.net , 12.13.14.15 , 13.17.18.3-13.17.18.10 , 123.123.0.0/8 


    Cloud services

    Cloud services offered by AWS, Google Cloud or Azure are widely used. But if users set up them incorrectly, they will face security threats.

    The cloud service target represents a cloud service account and is identified by a pair of Access key / Secret key / E.g.

    Access key = AHIGQ123456789123456
    Secret key = SECRET123456789.
    

    These keys are stored securely on our side by using AWS KMS and the algorithm AES256. We only use them for security purposes described in the features of CyStack Cloud Security. 


    Email

    It represents an email of invidual or business and is identified by its address. E.g, contact@cystack.net 

    Your email address is stored securely and is only used for security purposes described in the features of CyStack Cloud Security. 

    What is CyStack Platform?

    A comprehensive website security

    CyStack Platform is a web security platform delivered as a service. It simplifies security practices by applying the technology built up by experts.

    Most current network security solutions are too complex and, therefore, confusing to ordinary users. For maximised user experience and efficiency, we make it straightforward to conduct security activities with an improved UX / UI along with a powerful core. Whether you are a programmer, a network security expert, a sysadmin or a regular user, CyStack Platform can help you protect your website effortlessly.

    CyStack offers four main features for webmasters and developers:

    Scanning: Detect vulnerabilities in your web application

    Monitoring: Monitor your website's availability and performance round-the-clock

    Responding: Detect and remove malwares in web servers

    Protecting: Prevent attacks by serving as a web application firewall