Configuration errors or improper operations of cloud services can lead to attacks. The cloud security posture management (CSPM) feature provided by Security Center helps detect configuration issues and security risks across multiple dimensions, reducing risks associated with configuration errors and bolstering cloud service security. This topic outlines the CSPM feature and its billing methods.
Feature overview
Check the configurations of cloud services
Security Center allows you to check whether risks and errors exist in the configurations of your cloud services from the following dimensions: cloud infrastructure entitlements management (CIEM), security risk management, and compliance risk management. The check results are classified and displayed by risk level to help you understand the configuration risks of your cloud services.
Check dimensions
The following table describes the dimensions from which you can check the configurations of your cloud services.
For specific check items, refer to
page in the Security Center console.Dimension | Check Item | Description |
CIEM | AWS Identity and Access Management: IAM identity authentication and IAM permission management. |
|
Tencent Cloud Identity and Access Management: CAM identity authentication, and CAM permission management. | ||
Alibaba Cloud Identity and Access Management: RAM identity authentication, IDaaS, and RAM permission management. | ||
Security risk management | Alibaba Cloud Best Practices for Security: security, NoSQL database, storage, elastic computing, relational database, data warehouse, container and middleware, network, big data, DevOps and administration, and database management tools. |
|
AWS Best Practices for Security: computing, database, analytics, storage, networking and content delivery, and container. | ||
Azure Best Practices for Security: network, computing, container, storage, database, security, and monitor. | ||
Tencent Cloud Best Practices for Security: network, relational database, NoSQL database, storage, container and middleware, big data, security, and computing. | ||
Compliance risk management | Internationally agreed Best Practices for Security: Alibaba Cloud platform baseline, and AWS platform baseline. |
|
PCI Data Security Standard: Alibaba Cloud PCI DSS. |
| |
MLPS 2.0 Standard: Alibaba Cloud MLPS level 3. |
| |
ISO International Standard: Alibaba Cloud ISO 27001. |
|
Supported cloud services
Security Center allows you to add cloud services provided by Alibaba Cloud and third-party cloud service providers such as Tencent Cloud, Azure, and Amazon Web Services (AWS). You can view the supported cloud services in the Security Center console. For more information, see Add cloud services.
Assess risk levels
The CSPM feature primarily classifies risks based on their severity and application scenarios.
Risk Level | Description | Fixing suggestion |
High-risk | High-risk items include issues that significantly elevate the risk of intrusion or data exposure. These may involve exposed management ports and critical services, origin server bypass, credential leakage, unauthorized access, authentication bypass, and privileged accounts that are not disabled. | Immediate remediation is recommended. |
Medium-risk | These items, while not classified as high-risk, are important for improving data security as they address potential configuration weaknesses that could be exploited. | Timely remediation is recommended, or handle according to specific conditions. |
Low-risk | Check items that are not classified as medium-risk or high-risk, such as log audits and security governance reminders. | These can generally be ignored, but fixes should be implemented if required for reasons like compliance. |
Fix configuration risks in cloud services
Security Center provides optimization suggestions and solutions for each risk item to help you better manage cloud resources and ensure operational security.
Manual fixing: Confirm the risk impact on the cloud services by reviewing the threat impact and solutions from the check results before performing remediation.
One-click fixing: Security Center offers a feature that allows for one-click remediation of over 100 check items. This enables easy configuration corrections for relevant cloud service instances through the Security Center console.
In the Security Center console, you can view the check items that can be quickly fixed in the Security Center console. For more information, see Step 3: View check results.
Note that each time a risk of an instance is fixed, it consumes one of the remaining quota for CSPM.
Billing
Billing rules
You are charged for the CSPM feature based on the quota for each check item performed on each cloud service instance. The billing formula is: CSPM fee = Unit price × Quota.
Unit price: Unit prices vary on billing methods. For more information, see Billing methods.
Quota: The total number of scans, verifications, and successful fixes for each check item performed on each cloud service instance.
Quota = scan count + verification count + successful fix count.
A cloud service instance refers to the instance of a specific application or network device, such as an Object Storage Service (OSS) bucket or an Elastic Compute Service (ECS) security group.
Once CSPM is enabled, the system calculates the number of scan times each time you run a configuration check.
Total scan count of each scan task = total number of scanned instances × Number of selected check items.
For instance, if you have a total of 10 cloud services, with each service having 15 instances, and you select five check items in a scan task (each instance is scanned for five check items), the total scan count for the scan task would be calculated as follows:
10 (cloud services) × 15 (instances per service) × 5 (check items per instance) = 750 total scans.
Billing methods
The CSPM feature supports the subscription and pay-as-you-go billing methods. A free version of the feature is also provided. The free version supports only specific check items, whereas the paid version supports all check items.
An Alibaba Cloud account can only select one billing method at a time.
For example, if you have activated a subscription for CSPM feature, you must wait until the service expires or downgrade and disable the feature before you can switch to pay-as-you-go mode. For more information, see Switch from subscription to pay-as-you-go section of this topic.
For both subscription and pay-as-you-go billing methods, the billing logic remains consistent across the Antivirus, Advanced, Enterprise, and Ultimate editions.
After you purchase the CSPM feature based on the pay-as-you-go or subscription billing method, you can use all check items, including the free and billable check items. In this case, take note of the following items when you run a CSPM check:
You are not charged for the free check items that only involve scans and verifications, which do not consume the quota for CSPM that you purchase. You are charged for the free check items that involve successful fixes of risks, which consume the quota.
You are charged for the billable check items based on the number of times that each check item is used to scan each cloud service instance.
Free usage
You can use specific check items to scan and verify cloud service instances for an unlimited number of times free of charge. If you need to fix the risks, you should purchase the CSPM feature based on the pay-as-you-go or subscription billing method.
You can choose
in the left-side navigation pane of the Security Center console to view the supported free check items.If you have not purchased the CSPM feature based on the pay-as-you-go or subscription billing method and have not purchased a quota for the feature, you can use more than 70 check items that are provided by the feature free of charge.
The number of check items that you can use free of charge varies based on the edition of Security Center. If you enable the CSPM feature before July 07, 2023, you can use the following number of check items free of charge until your subscription to Security Center expires. If you renew the subscription before Security Center expires, you can continue to use the check items free of charge.
Basic and Anti-virus: more than 70
Advanced: more than 90
Enterprise and Ultimate: more than 250
More check items will be provided by the CSPM feature. If you want to use more check items, you can purchase the CSPM feature based on the pay-as-you-go or subscription billing method. For more information, see the Authorization and purchase section of this topic. After you purchase the feature, you can use all check items. The historical scan data is retained. You can view all check items and select check items for a configuration check.
Subscription
Formula: Unit price × Scan Quota for Cloud Security Posture Management × Subscription duration (the subscription duration of Security Center).
Scan Quota for Cloud Security Posture Management
Price (USD/time)
0~100,000
0.0009
100,001~500,000
0.00069
Greater than 500,000
0.000625
Offset rule: You must purchase a quota for CSPM of at least 15,000 with increments of 55,000. Each time you run a configuration check, the remaining quota is consumed based on the number of scan, verification, and fix times.
NoteIf the remaining quota is insufficient to offset the fee of a configuration check, the check items that cannot be covered by the quota are not used to scan, verify, and fix instances in the configuration check. You can view the scan results to check the details of the configuration check.
Pay-as-you-go
Formula: Unit price × Quota for CSPM (the total number of scans, verifications, and successful fixes on the current day).
You are charged based on the consumed quota for CSPM in the tiered pricing mode by calendar day.
Consumed quota for CSPM
Price (USD/time)
0~100,000
0.0009
100,001~500,000
0.0007
Greater than 500,000
0.00045
For more information about how to view the bills of the CSPM feature, see Billing details.
Authorization and purchase
When you use the CSPM feature for the first time, you must authorize Security Center to access cloud resources.
Authorize Security Center to access cloud resources.
Log on to the Security Center console. In the top navigation bar, select the region of the asset that you want to manage. You can select China or Outside China.
In the left-side navigation pane, choose .
On the CSPM page, click Authorize Now. The first time you use the CSPM feature, you must perform this operation.
After the authorization is complete, a service-linked role named AliyunServiceRoleForSasCspm is created for Security Center to access and modify the resources of cloud services within the current account. Then, you can use the CSPM feature to check the following configurations of your cloud services: identity authentication, network access control, data security, log audit, and basic protection. This helps you reinforce security configurations and reduce risks that are caused by configuration errors in your cloud services. For more information about the AliyunServiceRoleForSasCspm service-linked role, see Service-linked roles for Security Center.
Select a billing method to purchase the feature.
Pay-as-you-go
Subscription
Use the feature
Add cloud services: View the supported cloud services and add the cloud services whose configurations you want to check to Security Center. Alibaba Cloud services and third-party cloud services are supported
Use the CSPM feature: Configure a check policy, view check results, and handle the detected risk items.
Use the attack path analysis feature: Conduct thorough scans and analyses of access paths among Alibaba Cloud services to understand their interconnections and potential risk areas. The process is instrumental in detecting redundant direct access permissions and uncovering potential vulnerabilities.