Lacework Console Menu Redesign
The Lacework Console introduces a redesigned main menu that recategorizes menu items into new categories.
- These top-level menu items: Events, Compliance, Vulnerability, Resources, and Policies replace the previous top-level items: Monitor, AWS, Azure, Google Cloud, Host, and Container.
- The menu is located along the left of the page instead of the top of the page.
- The menu is collapsible/expandable.
- The global search bar is now located in the top left corner.
- Other functions (Recents, Help, Settings, Account, and User profile) are now located in the bottom left corner but are otherwise unchanged.
The new top-level items:
- Events is now a top-level menu item. The page content remains unchanged and continues to include a filterable timeline and event summary.
- Compliance is a new menu item that contains all compliance information categorized by cloud platform: AWS, Azure, and Google Cloud. Each cloud platform's compliance information includes a Dashboard and Reports.
- Vulnerability is a new menu item that contains all vulnerability assessment information categorized into Host and Container.
- Resources is a new menu item that contains all dossiers for resources: Cloud, Host, Container, Kubernetes, and Agents. Also included is Inventory, which provides visibility into integrated AWS resources.
- Policies is now a top-level menu item. The content remains unchanged and continues to include the ability to filter policies by type and category.
The table below lists all changes for navigating to specific pages. Additionally, if you want to see a side-by-side comparison of the previous and new menus, watch the following video.
|Monitor > Events
|Monitor > Policies
|Monitor > Agents
|Resources > Agents
|Monitor > Resource Management
|Resources > Inventory
|[cloud] > Compliance Dashboard
|Compliance > [cloud] > Dashboard
|[cloud] > Compliance Reports
|Compliance > [cloud] > Reports
|AWS > CloudTrail
|Resources > Cloud > AWS CloudTrail
|AWS > Compliance Summary
|Compliance > AWS > Summary
|Azure > Activity Log
|Resources > Cloud > Azure Activity Log
|Google Cloud > Audit Trail
|Resources > Cloud > Audit Trail
|Host > Vulnerability Assessment
|Vulnerability > Host
|Container > Vulnerability Assessment
|Vulnerability > Container
|Host > [dossier]
|Resources > Host > [dossier]
|Container > Containers
|Resources > Container
|Container > Kubernetes
|Resources > Kubernetes
- Container registry notification support for JFrog—The Docker V2 Registry integration introduces support for subscribing to notifications from JFrog. After creating an integration in the Lacework Console and adding a webhook to JFrog, Lacework can perform assessments at regular intervals. For more information, see Integrate a Docker V2 Registry.
- AWS IAM role support for Amazon Elastic Container Registry integrations—The Amazon Elastic Container Registry integration introduces support for using AWS IAM roles for authentication. To configure the integration, you must create a cross-account role that has the Lacework account as a trusted entity and then provide an external ID and role ARN. For more information, see Integrate Amazon Elastic Container Registry.
- Lacework organization (General Availability)—The ability to enroll your accounts in a Lacework organization is now in general availability. Enrolling in a Lacework organization allows you to centrally manage your environment’s security, compliance, and access control by aggregating information from all your Lacework accounts. With one organization containing multiple accounts, you can manage alerts, resource groups, team members, and audit logs for individual accounts and for the entire organization. A team member may have access to multiple accounts and can easily switch between them. To use the organization feature, you must complete a one-time enrollment process using an existing account. For more information, see Organization Overview.
- Handling of rejected CVEs—Lacework now filters out rejected CVEs for Ubuntu and Debian.
- Ubuntu 20.10 CVE data—Vulnerability Assessment support for Ubuntu 20.10 CVE data.