6.4 Data Breaches – Dashboards

Select > Reports > Portal > Repository > Standard Content > Cloud > CSA > The Treacherous 12.

While the risk of a data breach is not unique to the cloud, the CSA ranks it as a top concern for cloud customers. Sometimes the breach is the prime motivation of malicious users. However, breaches also result from mistakes made by individuals within the organization or poor security practices and software vulnerabilities.

To search for potential threats, use the following dashboards:

All Information Leakage Events

Provides charts and a table that show the leakage events in the organization, including the top reported events, destination users, and assets.

Information Disclosure Vulnerabilities

Provides charts and a table that show the disclosure vulnerabilities reported in the organization ofer time and by agent severity. You can also see the top 20 hosts, IP addresses, and signature ID events.

Organizational Information Leakage

Provides charts and a table that show the leakage of organizational information. You can view the top 20 leakage events and signature IDs, as well as leakage over time and agent severity.

Personal Information Leakage

Provides charts and a table that show the leakage of personal information. You can view the top reported, top 10 destination and source users, and leakage over time.