Basic security services of Elastic Compute Service (ECS) include unusual logon detection and vulnerability scanning. You can view the security status of ECS instances in the ECS or Security Center console in real time.
Background information
Alibaba Cloud Security Center provides basic security services for ECS free of charge, such as vulnerability scanning, basic alert notification, unusual logon detection, AccessKey pair leak detection, and compliance check. You can view security information about ECS assets on the Overview page of the ECS console or in the Security Center console. For more information, see What is Security Center?
Billing
Take note of the following items about the billing of basic security services:
If you use Security Center Basic Edition, basic security services for ECS are provided free of charge. For more information, see Introduction to Security Center Basic.
If you want to upgrade to Security Center Advanced or Enterprise Edition, log on to the Security Center console for a free trial or purchase of Security Center Advanced or Enterprise Edition. For information about the billing methods of Security Center Advanced Edition and Enterprise Edition, see Billing overview.
Use the Security Center agent
The Security Center agent is a lightweight security control that can be installed on ECS instances. If the Security Center agent is not installed on your ECS instance, your ECS instance is not protected by Security Center. The security data of the instance, such as vulnerabilities, alerts, baseline vulnerabilities, and asset fingerprints, is not displayed in the ECS console. For information about the installation path of the Security Center agent, see Operating systems supported by the Security Center agent.
Perform the following operations to manage the Security Center agent:
Automatically install the Security Center agent when you create an ECS instance.
Log on to the ECS console.
In the left-side navigation pane, choose
.In the top navigation bar, select a region.
Click Create Instance to create an ECS instance. In the Image section of the ECS instance buy page, select Free Security Hardening to automatically install the Security Center agent on the instance. For more information, see Create an instance on the Custom Launch tab.
NoteIf you call the RunInstances operation to create an ECS instance, set
SecurityEnhancementStrategy
to Active to automatically install the Security Center agent on the instance.Manually install the Security Center agent on an existing ECS instance.
For more information, see Install the Security Center agent.
Uninstall the Security Center agent.
For more information, see Uninstall the Security Center agent.
View security status and resolve security issues
To view the security status of ECS instances and resolve security issues, perform the following steps:
Log on to the ECS console.
In the left-side navigation pane, choose .
In the top navigation bar, select the region and resource group to which the resource belongs.
On the Instance page, find the ECS instance that you want to manage and click the
icon in the Monitoring column to log on to the Security Center console and view security reports.
Log on to the Security Center console to handle vulnerabilities and alerts. For information about how to handle vulnerabilities and alerts, see the Handle vulnerabilities section of the "View and handle vulnerabilities" topic and the Handle alerts section of the "View and handle alerts" topic.
Common security issues and scenarios
For information about common vulnerabilities and alerts and their scenarios, see Vulnerability categories and scenarios and Alerts and scenarios.
Configure alert notifications
Basic security services allow you to configure alert notifications for security alert items. The alert notifications can be sent by internal message. Perform the following steps to configure alert notifications:
Log on to the ECS console.
On the Overview page, click Handle below the unhandled vulnerabilities in the Security Score section to go to the Security Center console.
In the left-side navigation pane, choose
.Scroll down to the Alert row, specify the severities for alerts, and then select the method and time period for sending alert notifications. For information about alert severities, see the Risk levels of alerts section of this topic.
NoteIf you upgraded Security Center to Security Center Advanced or Enterprise Edition, see Overview for information about other methods for sending alert notifications.
Risk levels of alerts
The alerts generated by Security Center are classified into the following risk levels:
Risk level | Description |
Urgent | Urgent alerts are triggered by behavior that causes damages or imposes persistent impacts on your assets. This type of behavior is similar to common attacks such as reverse shells. Urgent alerts indicate that your assets are probably under attack. We recommend that you view the details of the alerts and handle the alerts at the earliest opportunity. |
Suspicious | Suspicious alerts are triggered by behavior that causes damages or imposes persistent impacts on your assets. This type of behavior is similar to some O&M behavior such as suspicious addition of users. This type of behavior may also be involved in an attack path but is unnecessary. Your assets can be attacked even if this type of behavior is missing. For example, the deletion of the traces that are left by attacks is unnecessary in an attack path. Suspicious alerts indicate that your assets have a certain probability of being attacked. We recommend that you view the details of the alerts and check whether risks exist. If risks exist, handle the risks. |
Reminder | Reminder alerts are triggered by behavior that is unnecessary in an attack path. Your assets can be attacked even if this type of behavior is missing. This type of behavior is similar to some O&M behavior such as suspicious port listening. If you have high security requirements for your assets, pay attention to Reminder alerts. |