Qualys Cloud View User Guide
Qualys Cloud View User Guide
User Guide
Qualys, Inc.
919 E Hillsdale Blvd
4th Floor
Foster City, CA 94404
1 (650) 801 6100
Table of Contents
About this Guide ............................................................................................... 7
About Qualys ........................................................................................................................... 7
Qualys Support ........................................................................................................................ 7
Reports ..............................................................................................................76
Assessment Reports .............................................................................................................. 76
On-Screen Reports ................................................................................................................. 79
Mandate Based Reporting ............................................................................................... 79
Policy Based Report ......................................................................................................... 82
List of Mandates .............................................................................................................. 85
Responses.........................................................................................................88
Configure Rule-based Alerts ................................................................................................. 88
Create and Manage Actions .................................................................................................. 89
Create a new Action ........................................................................................................ 89
Manage Actions ............................................................................................................... 90
Create and Manage Rules ..................................................................................................... 90
Create New Rule .............................................................................................................. 90
Manage Rules .................................................................................................................. 92
Manage Alerts ........................................................................................................................ 92
Sample Queries ............................................................................................................... 92
Trigger Criteria ................................................................................................................ 93
Alerting Permissions ............................................................................................................. 94
CloudView APIs...............................................................................................96
Accessing APIs Using Swagger ............................................................................................. 96
5
Appendix: List of Policies and Controls .................................................. 122
About this Guide
About Qualys
About Qualys
Qualys, Inc. (NASDAQ: QLYS) is a pioneer and leading provider of cloud-based security and
compliance solutions. The Qualys Cloud Platform and its integrated apps help businesses
simplify security operations and lower the cost of compliance by delivering critical
security intelligence on demand and automating the full spectrum of auditing,
compliance and protection for IT systems and web applications.
Founded in 1999, Qualys has established strategic partnerships with leading managed
service providers and consulting organizations including Accenture, BT, Cognizant
Technology Solutions, Deutsche Telekom, Fujitsu, HCL, HP Enterprise, IBM, Infosys, NTT,
Optiv, SecureWorks, Tata Communications, Verizon and Wipro. The company is also a
founding member of the Cloud Security Alliance (CSA). For more information, please visit
www.qualys.com
Qualys Support
Qualys is committed to providing you with the most thorough support. Through online
documentation, telephone help, and direct email support, Qualys ensures that your
questions will be answered in the fastest time possible. We support you 7 days a week,
24 hours a day. Access online support information at www.qualys.com/support/.
7
CloudView Overview
Qualys Subscription and Modules required
CloudView Overview
Qualys CloudView provides visibility and continuous security across all of your cloud
environments.
With CloudView you’ll get these features:
- Discover assets and resources across all regions from multiple accounts and multiple
cloud platforms
- Search resource metadata, view resource details and show associations across resources
- Out-of-the-box AWS, Azure, GCP policies
- Continuously assess and report resource misconfigurations by checking against the
controls from out-of-the-box policies
- Build your own policies and customize controls to suit your need
- Ability to view, filter and export misconfigurations
8
CloudView Overview
Concepts and Terminologies
9
Get Started
AWS
Get Started
Just set up a connector for your cloud environment and that’s it! We’ll start discovering
resources that are present in your cloud account. You can create AWS, Azure and GCP
connectors. We’ll walk you through the steps.
AWS
Configure AWS connectors for gathering resource information from your AWS account.
The connectors are created on the Connectors application. You can merge your existing
CloudView connectors or create a new one on the app.
Base Account
The AWS connectors uses Qualys accounts to query the AWS APIs. If you do not wish to
use the Qualys accounts, you can use the base account feature to use your own AWS
account for AWS API queries from CloudView. You need to configure your AWS account ID
and user credential for each base account type. For more information, refer to Permissions
for Fargate Profile.
10
Get Started
AWS
2) Select the existing base account with the merge icon. Show me.
11
Get Started
AWS
3) Select the base account you want to merge the account with
(CloudView/AssetView). Show me.
4) Authorize the merge and click on "Merge Base Account".
12
Get Started
AWS
}
]
}
5 - Click Next: Tags.
6 - Provide a name and description for the policy and then click Create policy. For example,
let us create Sample_Fargate_Policy.
The policy is created with required permissions. The next steps is to associate the policy
with the IAM role associated with the connector.
13
Get Started
AWS
- Step Functions
- Amazon Quantum Ledger Database (QLDB)
- Managed Streaming for Apache Kafka (MSK)
- API Gateway
- AWS Backup
- WAF
- Directory Service
- Lambda
- Elastic Block Storage (EBS)
- Elastic Map Reduce (EMR)
- Glue
- GuardDuty
Note: This additional permissions are not required for Cloud Inventory users.
You can create a new policy with the required permissions and attach the policy to the
IAM role associated with the AWS connector.
14
Get Started
AWS
"ec2:GetEbsEncryptionByDefault",
"ec2:GetEbsDefaultKmsKeyId",
"guardduty:ListDetectors",
"guardduty:GetDetector",
"glue:GetDataCatalogEncryptionSettings",
"elasticmapreduce:GetBlockPublicAccessConfiguration",
"lambda:GetFunctionConcurrency"
],
"Resource": "*"
}
]
}
15
Get Started
AWS
16
Get Started
AWS
Resources List
CloudView will discover and fetch following AWS resources and their corresponding
attributes.
- Subnet
- Network ACL
- Internet Gateway
- Load Balancer
- Instance
- Route Table
- S3 Bucket
- IAM User
- VPC
- Auto Scaling Group
- Security Group
- Lambda Function
- RDS
- EBS Volume
- EKS Cluster
- EKS Node Group
- EKS Fargate Profile
17
Get Started
Microsoft Azure
Microsoft Azure
Configure Azure connectors for gathering resource information from your Azure account.
The connectors are created on the Connectors application. You can merge your existing
CloudView connectors or create a new one on the app.
Let us see what permissions are needed to create Azure connector.
Pre-requisites
Before you create an Azure connector, ensure that you have the following permissions:
- Assign Azure Active Directory permissions to register an application with your Azure
Active Directory.
- Check Azure Subscription permissions to assign the application to a role in your Azure
subscription.
18
Get Started
Microsoft Azure
Run command:
az role definition create --role-definition <Role-Definition-
Json_file>
19
Get Started
Microsoft Azure
Note: These additional permissions are required for control evaluation for CID
50047/50084, covered as a part of custom role.
References
https://docs.microsoft.com/en-us/azure/role-based-access-control/custom-roles-cli
https://docs.microsoft.com/en-us/azure/role-based-access-control/tutorial-custom-role-
powershell
https://docs.microsoft.com/en-us/azure/role-based-access-control/role-assignments-
portal
Resources List
CloudView will discover and fetch following Azure resources and their corresponding
attributes.
- SQL Server
- Function App
- SQL Server Database
- Resource Group
- Virtual Network
- Virtual Machine (virtual machines created using Resource Manager only)
- Network Security Group
- Web App (App Service)
20
Get Started
Google Cloud Platform
21
Get Started
Google Cloud Platform
22
Get Started
Google Cloud Platform
Resources List
CloudView will discover and fetch following GCP resources and their corresponding
attributes.
- VM Instances
- Networks
- Firewall Rules
- Subnetworks
- Cloud Functions
23
Managing Connector Access for Users
User Permissions
User Permissions
The following table provides a comparison of privileges granted to user roles.
Operations User Sub User Sub User
(Manager (Reader role)
role)
Create New Users Yes No No
Grant Access to Sub- Users Yes No No
Update Access of Existing Yes No No
Users
Manage Connectors Yes No No
Manage Policies and Yes Yes No
Controls
Customize Controls Yes Yes No
Reports Yes Yes View only
Dashboards Yes Yes Yes
24
Managing Connector Access for Users
New Users: Scope and Permissions
Create User
Users with manager role can add users, up to the number allowed for the subscription
service level.
Quick Steps
(1) Create a Reader User: Navigate to Administration module > User Management > Create
User > Create Reader User.
(2) Provide the necessary information for the user creation such as General Information,
Locale, User Role, Asset Tags(optional), Permissions, Options, and Security.
Ensure that you select at least Reader role for User Role. For all other options you can
retain the default settings.
(3) Click Save.
25
Managing Connector Access for Users
New Users: Scope and Permissions
Warning - Be careful when removing the UI access permission from a role. A user
will not be able to log into the UI if they don't have at least one role with the UI
access permission assigned.
26
Managing Connector Access for Users
New Users: Scope and Permissions
Note: If you edit permissions for a pre-defined role or delete a pre-defined role,
the user associated with the roles you edit can experience difference in access
behavior.
27
Managing Connector Access for Users
New Users: Scope and Permissions
Tags
You can apply tags to connectors and group or segregate connectors using a specific tags
for a connector as well. Use tags to provide access or restrict access to connectors you
create.
28
Managing Connector Access for Users
New Users: Scope and Permissions
29
Managing Connector Access for Users
New Users: Scope and Permissions
Alternatively, you can create a new tag. For detailed steps on how to create a new tag,
refer to Configure Tags.
The selected tags are assigned to the connector.
Restrict User Access to all Connectors
By default, if no tags are assigned to a user, the user can access all connectors. To restrict
access to all connectors, you need to create a tag and not assign it to any connector but
only to the user.
30
Managing Connector Access for Users
Sub User (All Privileges)
Quick Steps
(1) Create a Reader User: Navigate to Administration module > User Management > Create
User > Create Reader User.
31
Managing Connector Access for Users
Sub User (All Privileges)
(2) In Administration utility, go to Role Management tab, and select CLOUDVIEW user and
select Add to Users from the quick action menu.
Alternatively, you could also create a new role and assign two permissions: CLOUDVIEW
UI Access and CLOUDVIEW API Access permissions to the role and assign the role to the
required user.
32
Managing Connector Access for Users
Sub User (All Privileges)
Note: If all the four permissions are enabled, the read only permission overrides
and sub user has only read privileges. For all privileges to be enabled, ensure that
you enable only two permissions.
(3) Select Assign Global Reporting Permissions from the Reporting permissions to provide
access to CloudView Reports. For more information, refer to Reporting Permission.
(4) Select the required user from Users drop-down and click Save. You need to choose user
whom you want to assign full access of CloudView.
The new user is ready to use CloudView with full access capabilities!
33
Managing Connector Access for Users
Sub User (Reader Privileges)
Quick Steps
(1) Create a Reader User: Navigate to Administration module > User Management > Create
User > Create Reader User.
34
Managing Connector Access for Users
Sub User (Reader Privileges)
(2) Create a role in Administration utility and ensure that the role has UI access
permission and CLOUDVIEW Readonly Access, CLOUDVIEW API Readonly Access enabled.
(3) Select Assign Global Reporting Permissions from the Reporting permissions to provide
the Reader access to CloudView Reports. For more information, refer to Reporting
Permission.
(4) Assign the role to the newly created user.
The new reader user is ready to use CloudView with monitoring capabilities!
Reporting Permission
We have added a new permission "Assign Global Reporting Permissions" under "Reporting
Permissions" group of CloudView to provide users the permissions to create, read, edit,
and delete reports in CloudView. By default, the Manager users have the global reporting
permissions and CloudView reporting permissions.
All existing sub-users with the write permissions to CloudView will have the new
reporting permissions enabled. All existing sub-users with read-only permissions will
have the reporting permissions and that can be granted per need
We also provide a role 'CloudView - only Reports' which has the ‘Assign Global Reporting
Permissions’ enabled. You can assign this role to any sub-user to provide access to
CloudView reports.
The manager user can choose to enable or disable the reporting access to CloudView
reports for sub-users to be able to perform reporting actions from the Administration
utility. A sub-user can perform reporting actions when a user with the Manager role
assigns the permission to the sub-user from the Administration utility.
35
Managing Connector Access for Users
Sub User (Reader Privileges)
36
Securing Cloud Resources
Unified Dashboard
Unified Dashboard
Dashboards help you visualize your cloud resources, evaluation of your cloud resources,
see your threat exposure, leverage saved searches, and fix resource misconfigurations
quickly.
We have integrated Unified Dashboard (UD) with CloudView. UD brings information from
all Qualys applications into a single place for visualization. UD provides a powerful new
dashboarding framework along with platform service that will be consumed and used by
all other products to enhance the existing dashboard capabilities.
You can use the default CloudView dashboard provided by Qualys or easily configure
widgets to pull information from other modules/applications and add them to your
dashboard. You can also add as many dashboards as you like to customize your
CloudView view.
Refer to the Unified Dashboard online help for more details.
Resources Details
The Resources tab displays the information about various resources collected. It helps you
to identify the number of resources for each type and the number of resources that have
one or more control failures. You can click on a row to view the number of resources of a
specific type. You can click on an individual resource to view the details. For each resource
you will view the following information.
37
Securing Cloud Resources
Resources Details
Resources Summary
The List View provides a summary of your resources, including the total resources and the
number of failed resources for each resource type.
Let us consider an example of Instance (EC2 Instance) and Security Group resource type to
view the resource details and information.
38
Securing Cloud Resources
Resources Details
Instance Details
Click Instance type to drill-down into your AWS EC2 instances. You could also use the
filters in the left pane to narrow down resources per region or account.
Then click on any EC2 Instance ID to see the number of detected vulnerabilities, resource
associations, location and network information. You can also perform actions on
instances such as stop instance or remove IAM profile. These actions are supported only if
you have enabled remediation for the connector associated with the instances. For more
information, refer to Actions for Cloud Resources (AWS).
39
Securing Cloud Resources
Resources Details
Go to Resources and then select the Cloud Provider (AWS, Azure, or Google Cloud
Platform). Now, select the resource of instance type and click the resource. The Resource
Details page displays the enhanced details.
Note: If the resource does not exist in Qualys Cloud Platform, the View Mode is displayed
for the resource.
40
Securing Cloud Resources
Resources Details
The vulnerability related data is populated only if you are using a scanner
appliance or Cloud Agent.
41
Securing Cloud Resources
Resources Details
Note: The vulnerability data is available only for Instance type of resource (AWS
cloud provider) and only after the Instances have been scanned.
42
Securing Cloud Resources
Resources Details
43
Securing Cloud Resources
Resources Details
44
Securing Cloud Resources
Resources Misconfigurations
Resources Misconfigurations
CloudView compares controls from the out-of-the-box policies that define the desired
configuration of a resource against the current configuration of the resource. If it finds a
difference, then it marks the resource as failed for that particular control. Each control is
evaluated against the applicable resources. If all the applicable resources are configured
as per the desired configuration of the control, then the control is marked as Pass. If at
least one of the applicable controls doesn’t comply with the control, then it is marked as
failed. The Monitor tab will display all such misconfigurations.
45
Securing Cloud Resources
Resources Misconfigurations
Resource Evidence
To get more details on why a resource failed, click the Evidence link to see actual values
for the resource attributes.
46
Securing Cloud Resources
Resources Misconfigurations
-Last Reopened: The latest date when the control evaluation result is changed from pass
to fail.
-Last Fixed: The latest date when the control evaluation control result is changed from fail
to pass.
47
Securing Cloud Resources
Resources Misconfigurations
48
Securing Cloud Resources
Resources Misconfigurations
Click the link to automatically form the search query based on the VPC ID and view the
search results.
49
Securing Cloud Resources
Resources Misconfigurations
Start typing and we'll show you the properties you can search such as account ID, control
criticality, control result, etc. Select the one you're interested in.
50
Securing Cloud Resources
Resources Misconfigurations
Now enter the value you want to match, and press Enter. You can also choose a date
range. That's it! Your matches will appear in the list.
You'll notice a Search field and this is where you'll enter your search query.
51
Securing Cloud Resources
Resources Misconfigurations
Start typing and we'll show you the properties you can search such as cid, control.name,
and so on. Select the one you're interested in.
You could perform various actions on the controls such as re-evaluate the control, create
exception for a failed resource, and so on. Select the control and click Actions or the quick
actions menu. See Exceptions to know more about exception.
52
Securing Cloud Resources
IaC Posture
To know what led the control to pass or fail, click Evidence. The Evidence details will tell
you the reason that led the control to pass or fail.
IaC Posture
The IaC posture sub-tab under Monitor tab provides your compliance posture of resources
residing in your Infrastructure as Code (IaC) templates.
Note: The IaC evaluations are displayed for scans initiated from Git integrations. For more
information on Git integrations, refer to the Secure IaC section in CloudView User Guide.
Click any control to get details of all the resources evaluated against the control.
53
Securing Cloud Resources
IaC Posture
Start typing and we'll show you the properties you can search such as account ID, control
criticality, control result, etc. Select the one you're interested in.
Now enter the value you want to match, and press Enter. You can also choose a date
range. That's it! Your matches will appear in the list.
54
Securing Cloud Resources
IaC Posture
You'll notice a Search field and this is where you'll enter your search query. Start typing
and we'll show you the properties you can search such as cid, control.name, and so on.
Select the one you're interested in.
You could also view other failed control for the same resource. Select the control and click
Actions or the quick actions menu.
The Result column indicates the evaluation result of the resource against the control.
Depending on the evaluation result, the Result column displays one of the following
values:
- Fail: Indicates the resource failed the control evaluation.
55
Securing Cloud Resources
Exceptions
Exceptions
You may want to create exceptions to exempt certain cloud resources from a particular
control or temporarily change the status of a resource for a particular control from Failed
to PassE (Pass with Exception).
For example, it may be the policy in an organization that a particular cloud resource is
not allowed on any server or port. However, there could be a business need for the
organization to provide an exception for one or more resources on a temporary basis. This
may be required to support a custom application or other business need. You could use
exceptions in such scenarios.
Create Exception
Here are quick steps to create an exception.
56
Securing Cloud Resources
Exceptions
1. Go to Monitor tab. You'll notice a Search field above the controls list. Enter your search
query for failed evaluations and click the required control in the search results to view the
control evaluations.
2. Select the failed resource for which you want to create an exception and click Create
Exception from the quick actions menu.
Note: The Create Exception option is available in the quick action menu only for resources
with failed control evaluations (FAIL).
3. The Exception wizard is displayed. Provide the following details for the exception:
57
Securing Cloud Resources
Exceptions
- Basis details such as name for the exception, reason to create the exception, an
explanation, start and end date for the exception. Optionally, you could also provide the
information regarding the security policy and procedure for which the exception is being
created.
- Scope Information: Decides the scope of the exception you are creating. By default,
Resource option is selected. You could expand the scope of the exception to all resources
in a specific account.
58
Securing Cloud Resources
Exceptions
You can associate maximum 200 resources with an exception during creation. For
example, if you configure number of rows shown to be 200, and then select all
resources on the page and click Create Exception from Actions menu.
As a result, all the selected 200 resources get associated with the exception you
create. As we have a limitation of displaying 200 rows on a page, we cannot
associate more than 200 resources with a single exception.
59
Securing Cloud Resources
Exceptions
• Connector: Choose to create exception for all resources in the account associated
with the connector. By default, the connector associated with the resource is
selected. You could click Add More Connectors to add multiple connectors for the
exception.
Note: The exception created at connector level is implemented on the resource evaluation
result in the next connector run.
- Controls: The control for which the evaluation failed is auto-populated. Click Add More
Controls to include more controls of the same resource type.
4. Review the information you provide for the exception and click Create Exception.
That’s it! The exception is created. The exceptions you create are listed in Exceptions tab.
Go to Policy > Exceptions to view the list of all exceptions.
60
Securing Cloud Resources
Exceptions
Once the exception is in ACTIVE status, the resource result immediately changes from Fail
to PassE (Pass with Exception). The Exception Details section in Evidence displays all the
exception details. The exception details are updated only when the exception status
changes or on every connector run.
61
Securing Cloud Resources
Exceptions
View Exceptions
Go to Policy > Exceptions to see exceptions. Select View from the quick actions menu for
any exception to view complete details about the exception. You can also view a history
log for the exception.
Edit Exceptions?
You can edit exceptions when they are in active status. You can change the start date, end
date, explanation, controls associated with the exception, information security policy, and
information security procedure. Go to Policy > Exceptions to see exceptions. Select View
from the quick actions menu. Click Edit in the Exception Summary tab to edit the required
exception details.
62
Securing Cloud Resources
Exceptions
Delete exceptions?
Yes. Users with required permissions can delete any exception. Users with reader
permissions can only view exceptions.
Important - When exceptions are deleted, the exception history is permanently removed
and cannot be recovered.
Exception History
All actions are logged in the exception history with the name of the user who performed
the action and a time stamp for when the action took place. Select View from the quick
actions menu for any exception and then go to the History section. The original exception
request and each action taken on the exception since the request are listed.
Exception Status
Exception status levels include:
Inactive: An exception is in inactive status if the current date is lesser than the start date
of the Exception. Once the current date and start date match, the exception automatically
changes to active status.
Active: An exception is in active status when the current date falls between the start date
and end date of the Exception.
Expired: An exception is in expired status if the current date exceeds the end date of the
Exception. When an exception is expired, a status of Fail appears again for the resource in
control evaluation.
63
Securing Cloud Resources
Exceptions
64
Policies and Controls
Customize Controls
Customize Controls
Controls are the building blocks of the policies used to measure and report compliance for
a set of hosts. We provide many controls for you to choose from and you can customize
them too. Controls play the key part in the compliance posture of resource.
65
Policies and Controls
Customize Controls
System Controls
System-defined Control is a predefined control provided by Qualys. Few system-defined
controls are customizable while others are not. The control indicator icon tells us if the
control is customizable or not.
- for System Defined Controls. Such controls cannot be customized. You cannot alter
the parameter values for such system-defined controls.
- used to indicate that the control can be customized to suit your need. You can
change the parameters values for such controls and customize them as per your
organization’s requirements.
User-Defined Controls
used to indicate that the control can be customized. You can copy any system-defined
control to make your own user-defined controls that you can customize to meet your
needs.
You can then modify the parameters of the control as per your requirement and save the
customized control. The customized control is available to associate with policy and
evaluate the resources.
For example, let us modify the minimum password length to 10 for AWS CID 11.
66
Policies and Controls
Customize Controls
(1) Select the control and click Create Copy from quick action menu.
(2) Change the name of control and criticality if needed. Click Next
(3) Set the expected value in Evaluation Parameter to 10. Change other aspects such as
Evaluation Description, Evaluation Message as per your need. Click Next.
(4) Update the Additional Details if needed. Click Create.
That's it! Your new custom control is ready to use.
67
Policies and Controls
Customize Controls
(3)Provide the basic details for the control such as Name, Description, select the Criticality
and cloud Provider, and click Next.
(4) Click icon to include QFlow that is created in Qualys Flow app.
If you do not have Read Permissions to Qualys Flow module, the icon is not available.
For details on permissions, refer to Manage Custom Control Permissions.
For more information on the Qualys Flow application, refer to Qualys Flow Getting Started
Guide.
68
Policies and Controls
Customize Controls
(5) Select the QFlow from the list and click Add to control.
For the QFlow to be displayed in the list, in the Qualys Flow application, the CloudView
node should be added while creating the QFlow and the QFlow should be deployed
(enabled).
(6) The QFlow is added in the control, click Next.
(7) Fill in the additional details for your reference, like the objective of adding this control
in Rationale, remediation steps if you want to suggest in Remediation, References and
click Next.
(8) Review the details of your control and click Create Control.
Associate the control to a user-defined policy to be evaluated for the custom policy. For
details on creating a custom policy, refer to Build Your Own Policy
69
Policies and Controls
Customize Controls
Control Criticality
You can modify the criticality of any control to suit your need. If the control criticality
needs to be changed to match your environment, you can select the control, select Change
Criticality from quick action menu.
Select the criticality you want to assign to the control and click Change Criticality.
Note: When you change criticality, the revised control criticality for existing
evaluations is effective on Monitor View upon next connector run.
Let us consider a scenario where a control with HIGH criticality evaluated three resources.
Now, if you change the criticality of the control to LOW, the change in evaluation results
reflects only after connector run. During the connector run, assume that only two
resources get detected. The control evaluation results for resources that get detected post
connector run will reflect LOW criticality. However, control evaluation result for the
resource that did not get detected post connector run will be counted as HIGH criticality.
70
Policies and Controls
Build Your Own Policy
71
Policies and Controls
Build Your Own Policy
(2) Provide the basic details for the custom policy such as name, description, select the
cloud provider, and select the type of execution controls to be included in the policy.
You could choose the controls depending on their execution type:
- Run Time: controls for evaluations on deployed cloud resources.
- Build Time: controls for evaluations on cloud resources within the IaC templates.
Click Next.
72
Policies and Controls
Build Your Own Policy
Select the controls to be associated with the policy and click Add. Click Next.
You can associate system-defined controls or create your own custom control using
existing control to suit your need. For more information, refer to Customize Controls.
(4) Select the connector groups or connectors that should be analyzed for policy
compliance. Click Next.
73
Policies and Controls
Build Your Own Policy
Policy Search
Find all about your policies and get up to date information quickly using Qualys Advanced
Search. Start typing in the Search field and we'll show you the properties you can search
such as policy.name, provider, etc. Select the one you're interested in.
Search for policies based on the properties.
Now enter the value you want to match, and press Enter. That's it! Your matches will
appear in the list. For detailed steps on how to form search queries, click here.
Associating Controls
You could build your policy by associating relevant controls to it.
74
Policies and Controls
Build Your Own Policy
75
Reports
Assessment Reports
Reports
You can generate reports to view the compliance posture of your cloud resources. Run
reports to learn whether your resources are compliant with mandates and compliance
policies.
The reports you could generate are:
Assessment Reports
You can generate a report to view the compliance evaluation of your resources for
multiple policies in your cloud environment. You can use our Qualys Query Language
(QQL) query driven report wizard to generate on-demand assessment report. When the
report is successfully created, you can also download it in CSV or PDF format using our
quick actions menu. For detailed information and steps on Assessment report, see
Assessment Reports.
On-Screen Reports
Create a custom template for the reports by telling us the settings. The report templates
are saved and available to you. Every time you want to view the report, just select Run
Report from the quick actions menu. You can edit the report template to reconfigure or
change the report settings. Depending on the criteria you define in the report template,
you could generate two types of reports: Mandate Based Reporting and Policy Based
Report.
Assessment Reports
Use assessment reports to view the compliance of your resources for the defined policies
in CloudView. You can use Qualys Query Language (QQL) to generate the on-demand
assessment reports.
Create an assessment report by telling us the settings. The report settings are saved and
available to you. Once you generate an assessment report, you can view the report
summary, reconfigure the report settings, and download the report in CSV or PDF format.
76
Reports
Assessment Reports
77
Reports
Assessment Reports
7) Select the group, connector, or a combination of groups and connector you want to
evaluate for compliance.
8) Use evaluatedOn search query token to specify the date criteria for report you want to
generate.
9) Select Resource Summary check box to include details resource ID, connector, control
ID, resource type, evaluation date, and resource result in the report (applicable only for
PDF report format).
Note: Assessment reports containing up to 8k records with Resource Summary get
successfully downloaded. Download of assessment report exceeding 8k records and
Resource Summary is currently not supported for PDF reports.
10) Resource Evaluation Result: Select the evaluation results to be included in the reports
for resources evaluated against the controls that meet criteria defined in Search Query.
You could choose from Pass, PassE (pass with exceptions), and Fail options. You can
choose multiple options.
11) Review the configured report settings in the Summary pane and then click Create and
Run Report.
78
Reports
On-Screen Reports
On-Screen Reports
Create a custom template for the reports by telling us the settings. The report templates
are saved and available to you. Every time you want to view the report, just select Run
Report from the quick actions menu.
You can edit the report template to reconfigure or change the report settings. Depending
on the criteria you define in the report template, you could generate two types of reports:
Mandate Report and Policy Report.
79
Reports
On-Screen Reports
3) Select the cloud provider for which you want to generate the mandate report.
4) Select the Mandate in the report type and then click Next.
-Select the Policy from the drop-down. You can select multiple policies.
-Select the Mandate from the drop-down. You can select only one mandate.
5) Select the execution type
80
Reports
On-Screen Reports
6) Select the groups, connector, or a combination of groups and connector you want to
evaluate for compliance.
7) Review the configured report template settings in the Summary and then click Create
Template and Run Report.
81
Reports
On-Screen Reports
82
Reports
On-Screen Reports
3) Select the cloud provider for which you want to generate the policy report.
4) Select the Policy in the report type, select the Policy from the drop-down and then click
Next. You can select multiple policies.
5) Select runtime or buildtime in execution type.
83
Reports
On-Screen Reports
6) Select the group, connector, or a combination of groups and connector you want to
evaluate for compliance.
7) Review the configured report template settings in the Summary and then click Create
Template and Run Report.
84
Reports
On-Screen Reports
List of Mandates
We support the following mandates for report generation.
1 ISO/IEC 27001:2013
2 Cloud Controls Matrix (CCM)
3 NERC Critical Infrastructure Protection (CIP)
85
Reports
On-Screen Reports
86
Reports
On-Screen Reports
87
Responses
Configure Rule-based Alerts
Responses
You can set up rules to alert you and keep you aware of resources that fail certain critical
control evaluations and allow for fixing resource misconfigurations. Instead of having to
actively monitor the system, these alerts ask for attention and intervention only when
necessary, and make you aware of changes or significant findings as soon as the rules are
met.
For example, you can set up alerts for:
- Resources failing for particular control
- Evaluation result of highly critical controls
- Evaluation result of controls of specific policy
- Resources failing in the latest connector run
(1) Define actions that the rule must take in response to the alert. For detailed steps, see
Create and Manage Actions.
(2) Set up your rules in the Rule Manager tab. For detailed steps, see Create and Manage
Rules.
(3) Monitor all the alerts that were sent after the rules were triggered. For detailed steps,
see, Manage Alerts.
That's it! You are all set to start being alerted about your cloud-resources.
88
Responses
Create and Manage Actions
89
Responses
Create and Manage Rules
Manage Actions
View the newly created actions in the Actions tab with the details such as name of the
action, type of the action, the number of rules for which this action is chosen are active or
inactive and the user who created the rule.
You can use the Actions menu (for bulk selections) or Quick Actions menu to edit action,
delete actions and save an existing action along with its configuration to create a new
action with a new name. Use the search bar to search for actions using the search tokens.
90
Responses
Create and Manage Rules
(4) In the Trigger Criteria section, choose from three trigger criteria that work in
conjunction with the rule query. The trigger criteria are: Single Match, Time-Window
Count Match and Time-Window Scheduled Match. For more information on trigger
criteria, see Trigger Criteria.
(5) In the Action Settings section, choose the actions that you want the system to perform
when an alert is triggered.
91
Responses
Manage Alerts
Manage Rules
The Rule Manager tab lists all the rules that you have created with rule name, trigger
criteria selected for the rule, alert message aggregating enabled or disabled for the rule,
action chosen for the rule, date and time when the rule is last triggered and state of the
rule, whether the rule is enabled or disabled and created date and time of the rule.
You can use the Actions menu or Quick Actions menu to edit, enable, disable, delete rules
and save an existing rule along with its configuration to create a new rule with a new
name. Use the search bar to search for rules using the search tokens.
Manage Alerts
The Activity tab lists all the alerts. Here you will see for each alert, rule name, success or
failure in sending the alert message, aggregate enabled (Yes) or disabled (No) for the rule,
action chosen for the rule, matches found for the rule and the user who created the rule.
-Search for alerts using our search tokens.
-Select a period to view the rules triggered during that time frame.
-Click any bar to jump to the alerts triggered in a certain time-frame.
-Use these filters to group the alerts by rule name, action name, email recipients and
status.
Sample Queries
Scenario 1: Rules with specific name and are successfully executed with PagerDuty action.
ruleName:"api test sub name rule" and status:SUCCESS and
action.type:PAGERDUTY
92
Responses
Manage Alerts
Trigger Criteria
- Select Single Match if you want the system to generate an alert each time the system
detects an event matching your search query
- Select Time-Window Count Match when you want to generate alerts based on the
number of events returned by the search query in a fixed time interval. For example, an
alert will be sent when three matching events are found within 15 minutes window..
- Select Time-Window Scheduled Match when you want to generate alerts for matching
events that occurred during a scheduled time. The rule will be triggered only when an
event matching your search criteria is found during the time specified in the schedule.
Choose a date and time range for creating a schedule and specify how often you want to
run the schedule for example, daily, weekly and monthly. For example, send daily alerts
with all matches in a scheduled window between 4 pm and 5 pm.
93
Responses
Alerting Permissions
For the Weekly option, select the days of the week on which schedule will run. For
example, send weekly alerts with all matches generated between 2.19 pm and 3.19 pm on
every Monday and Wednesday.
For the Monthly option, specify the day of the month on which the schedule will run. For
example, send monthly alerts on the first day of every month.
For Select Time-Window Count Match and Select Time-Window Scheduled Match, you
have the option to aggregate the alerts by aggregate groups such as based on account Id,
subscription Id, and so on.
Alerting Permissions
Assign permissions related to alerting to your user. Depending on the permissions
assigned, the user can perform actions like creating, editing, or deleting rules and actions.
Using the Administration module, the Manager user for that subscription can assign these
permissions to other users.
Only the user having the Alerting Access permission can view the Responses tab on the
CloudView UI.
94
Responses
Alerting Permissions
95
CloudView APIs
Accessing APIs Using Swagger
CloudView APIs
Many CloudView features are available through REST APIs. You can use Swagger tool to
access the REST APIs we support.
API Examples
You can view examples and details on API usage in our CloudView API User
Guide.
96
CloudView APIs
Accessing APIs Using Swagger
Qualys maintains multiple platforms. The Qualys URL that you should use for API
requests depends on the platform where your account is located.
Qualys Platform URLs
Qualys US Platform 1 https://qualysguard.qualys.com
Qualys US Platform 2 https://qualysguard.qg2.apps.qualys.com
Qualys US Platform 3 https://qualysguard.qg3.apps.qualys.com
Qualys EU Platform 1 https://qualysguard.qualys.eu
Qualys EU Platform 2 https://qualysapi.qg2.apps.qualys.eu
Qualys India Platform 1 https://qualysguard.qg1.apps.qualys.in
Qualys Canada Platform https://qualysapi.qg1.apps.qualys.ca
Do I need to Authenticate?
Authentication to the Qualys Cloud Platform is necessary before you try out the APIs.
Simply, click Authorize and provide the user name and password. You can now use the
APIs!
97
Remediating Cloud Resources
Configuring Remediation
Configuring Remediation
You can not only detect and evaluate cloud resources but also remediate resources in your
cloud environment. You can quickly fix resource misconfigurations and remediate your
cloud resources.
Pre-requisites
Ensure that you have the following modules available in your subscription:
- Cloud Security Assessment (CSA) Subscription
- Administration
If you need access to a module, please contact your Qualys Technical Account Manager
(TAM).
A user with Manager role or sub-user with Manage Remediation permission can use the
remediation feature. For more information on the configuring access for remediation, see
Managing Remediation Permission.
Quick Steps
With the remediation enabled for the connectors, while resources are discovered and
evaluated by CloudView, you are provided with one-click remediation option. We will walk
you through the steps.
98
Remediating Cloud Resources
Configure Remediation: AWS
Pre-requisites
Before you create an Azure connector, ensure that you meet the following requirements:
- Enable Remediation for Azure Connector to register an application with your Azure
Active Directory.
- Check Azure Subscription permissions to assign the application to a role in your Azure
subscription.
99
Remediating Cloud Resources
Remediating Cloud Resources
Remediable Evaluations
With remediation enabled, you can filter out controls with failed evaluations that can be
remediated.
The “ ” icon indicates that these controls are available for remediation. Click on one of
the controls to proceed with Remediation.
100
Remediating Cloud Resources
Actions for Cloud Resources (AWS)
101
Remediating Cloud Resources
Actions for Cloud Resources (AWS)
Benefit: Block instance having critical vulnerability from accessing AWS services or stop
instance to quarantine it.
You can directly control remediable actions from Qualys for Instance resources.
We support the following actions for AWS Instance resources:
Stop Instance
The Stop Instance action allows you stop an already running instance on AWS cloud. You
can use the action as an immediate response on a newly detected unknown instance. For
example, if you operate only in Mumbai region, but instances are detected in North
Carolina region (where you do not operate). In such cases, the first response action
towards such unknown instance would be to stop the instance and then troubleshoot it.
You can now execute actions on such instances from Qualys console.
102
Remediating Cloud Resources
Actions for Cloud Resources (AWS)
1. Go to Resources > Amazon Web Services > Instance resource type. All the instances in
your account are listed. The Actions column displays the possible actions.
103
Remediating Cloud Resources
Permissions Required
Go to Resources > Amazon Web Services > Instance resource type. All the instances in
your account are listed. The Actions column displays the possible actions.
Permissions Required
We have provided permission for remediation. You can choose to enable to disable
remediation for sub-users.
104
Remediating Cloud Resources
Permissions Required
By default, remediation is accessible to all the Manager users. You can assign access to
sub-users based on their Roles. For a sub user to be able to perform remediation actions, a
user with Manager role needs to assign the permission to the sub users from the
Administration utility.
There are two types of sub users that a user with Manager role can create. Depending on
the permissions you assign to the role, you could categorize the sub users as follows:
All privilege: You need to assigns Manage Remediation permission to a sub user with all
privileges so that the sub user can perform all actions related to remediation.
Reader privileges: Sub user with Reader role can view remediable controls and connectors
for which remediation is enabled. The sub user can neither create or edit connectors with
remediation enable, nor can they execute any remediation actions on any of the
resources.
105
What’s more in CloudView
Download Datalist
Download Datalist
By downloading datalist to your local system you can easily manage the list outside of the
Qualys platform and share them with other users. You can download results in CSV
format.
The datalist that is available for download includes resources (grouped view and resource
view), controls, control evaluations, and connectors list.
The download is limited to 10,000 records.
1) Use our search to narrow down your results.
2) Select Download from the Tools menu.
106
What’s more in CloudView
Choosing Data Range
107
What’s more in CloudView
Saved Search
Saved Search
You can easily save your searches for reuse and share them with other users.
Enter your search query and then click Save this Search Query.
Choose Load/manage Saved Searches to use one of the searches you previously saved.
108
What’s more in CloudView
Customize Dashboards
Customize Dashboards
Dashboards help you visualize your assets. You can add widgets with search queries to see
exactly what you're interested in. You can also export and import Dashboard and Widget
configurations, from the Tools menu, to a file in a json format allowing you to share them
between accounts or within the Qualys community.
Each dashboard is a collection of widgets showing resource data of interest. You can
create multiple dashboards and switch between them.
You can personalize the default dashboard - add widgets, resize them, move them around
to change the layout. Use the menu to manage your dashboards.
109
What’s more in CloudView
Customize Dashboards
3) Each widget is unique. Define your custom settings. For some you'll select query data
source, a query, group by option, limit and layout - count, table, bar graph, pie chart.
110
What’s more in CloudView
Customize Dashboards
111
Securing Infrastructure as Code
Template Support
Template Support
This Qualys IaC Security version supports following template files:
- AWS, Azure, and GCP Terraform Templates: The .tf template files - IaC Security scan
supports over 100 terraform resource types.
- AWS, Azure, and GCP Terraform Plan: The .json plan files - To scan the plan files, you
need to make those files available in JSON format. Refer
https://www.terraform.io/docs/internals/json-format.html
- AWS Cloudformation Template: We support the file types:.json, .yaml, .yml, .template
- Compressed Template File Formats: We are supporting following compressed template
file format: .zip, .7z, .tar, .tar.gz, .gz
116
Securing Infrastructure as Code
Pre-requisites
Pre-requisites
Users with a non-expired paid/trial version of Cloud Security Assessment (CSA)
subscription that has API access enabled. The following users with required permissions
can access IaC:
- A user with Manager access
- A sub-user with the CLOUDVIEW API Access
Once Qualys IaC Security is installed, you may verify the installation by running the
following commands.
$ qiac -v / --version
Version: <installed version>
$ qiac -h / --help
Usage: Show this message and exit.
117
Securing Infrastructure as Code
Scanning Template Files Using CLI
List of Commands
Common Options Description
-c, --config_file (Optional) Path of the credentials config file set using "config" command
-a, --platform_url Qualys Platform URL
-u, --user Qualys username
-p, --password Qualys password
-m, --format Provides the output in JSON format. [json]
-x, --proxy Provide proxy in JSON format
For example,. {\"http\":\"http:
//<user>:<password>@<host>:<port>\",\"https\":\"https://<host>:<port>\"}
-h, --help Show this message and exit
scan
-n, --scan name (required) Name of the scan
-pn, --policy_name Cloud security assessment (CSA) policy name [Execution type: Build
time]
-d, --path (required) Single template file or a directory path
-f, --filter Use regular expression to filter to and include the input files.
Example: ".*[.]tf$"
Note: This option must used only when directory path is specified in the
path option
-as, --async Launches/Triggers the laC scan asynchronously
-q, --quiet Show only failed checks
-g, --tag Add the tag (in JSON format) to the scan
For example, [{"env":"linux"},{"test_key":"tags"}]
-s, --save_output (optional) Save the output in the current directory
getresult
-i, --scan_id Scan ID
-s, --save_output (optional) Save the output in the current directory
listscans
-i, --scan_id Scan ID
config
-a, --platform_url (required) Qualys Platform URL
-u, --user (required) Qualys username
-p, --password (required) Qualys password
-c, --config_file (optional) File path to store the configuration
118
Securing Infrastructure as Code
Scanning Template Files Using CLI
Below are some of common scenarios for command usage. Usage of parameters vary
based on use cases.
Configure IaC CLI (optional command)
1: Trigger Scan (add -d)
2: Get the scan results
3: Get the whole scan list
4: Get the scan list of single Scan ID
Note: The parameters: Qualys Platform URL, username, and password are mandatory
for this command.
config_file : name or path of the config file
where,
name: if the name is provided, then a config file with the specified name is created.
path: if the path is provided, then the config file is created at the specified path with the
default name. The default name is .qiac.yaml.
This command saves the config file on the user's home directory with the name
.qiac.yaml. If a user doesn't want to save the config file in the home directory, the user can
use the config_file option to provide the config file path. The config_file option saves the
file at the specified path.
A user can use the config file using below ways:
- Use Config file from home directory:
qiac <commands|params>
119
Securing Infrastructure as Code
Scanning Template Files Using CLI
where,
the commands could be scan, getresults, listscans.
Note: If the user does not provide credentials in command options, then CLI checks for the
config file in the current directory. If the config file is not present in the current directory,
then CLI checks the user's home directory.
Note: Ensure that you always use file format option (-m JSON) along with -s option. The
option -s saves the scan output in the current directory in JSON format. The file name is
as follows:
scan_response_<scanId>.json
- With policy name option (-pn)
qiac scan -a <Qualys Platform URL> -u <username> -p <password> -n
<scan name> -d <path or single file> -pn <policy name>
Note: The policy name should be entered in single quotes for Linux users and in double
quotes for Windows users. The policy name must match with existing policies in
CloudView.
120
Securing Infrastructure as Code
Scanning Template Files Using API
121
Appendix: List of Policies and Controls
122
Appendix: List of Policies and Controls
123