NeoCAT is a solution for continuous monitoring and mitigating security risks across cloud resources and services. Using agentless technology, it detects vulnerabilities in resource configurations, networks, privilege settings, and installed software. NeoCAT notifies users of vulnerabilities found in the cloud and generates a detailed report with a description of issues and troubleshooting instructions. About 400 unique security checks are available.
Benefits
- No extended cloud permissions required.
- No need to install any agent.
- No transfer of data outside your cloud.
Pro version features
- Agentless vulnerability scanning of VM and container software with no impact on your resources
- Integration with tracking tools
- External API for integrating with user systems
- Automated inventory and service risk mapping
- Distribution of protected resources across projects and teams
-
Create a
neocat-main
service account with theviewer
andcertificate-manager.certificates.downloader
roles for the cloud, folder, or organization. It will be used to read resource configurations. -
Create an authorized key for the
neocat-main
service account. Save the ID and private key. -
Create a service account named
neocat-additional
with the following roles:viewer
andcompute.disks.user
for the folder or organization where you need to scan VMs for vulnerabilities.compute.admin
andvpc.securityGroups.admin
for the folder where NeoCAT is deployed. We recommend deploying it in a separate folder.
-
Create an authorized key for the
neocat-additional
service account. Save the ID and private key. -
Create a security group in the subnet where you will deploy NeoCAT and configure the following rules:
Traffic direction Description Port range Protocol Destination / Source CIDR blocks Outgoing
Access to vulnerability database update service
873
TCP
CIDR
130.193.54.168/32
Incoming
Access to NeoCat VM via web interface
443
TCP
CIDR
0.0.0.0/0
Outgoing
Access to Yandex Cloud metadata service by NeoCat VM
80
TCP
CIDR
169.254.169.254/32
If you need to enable web interface access for one address only, instead of
0.0.0.0/0
, specify the appropriate address and the/32
mask, e.g.,11.12.13.14/32
. -
Get an SSH key pair to connect to a virtual machine (VM).
-
Create a VM from a public image:
- Under Image/boot disk selection, go to the Cloud Marketplace tab and select NeoCAT — Cloud Security Platform (PRO version).
- In the Security group field, select the security group you previously created.
- Under Access:
- In the Service account field, select
neocat-main
. - Enter the username in the Login field.
- Paste the contents of the public SSH key file in the SSH key field.
Save the private IP address and ID of the VM.
- In the Service account field, select
-
Open
http://<VM_private_IP_address>/
in your browser. -
Use the following properties for authorization:
- Username:
Admin
- Password:
<VM_ID>
- Username:
Download the user guide here.
To start your free trial, contact support at clients@neocat.cloud.
- Auditing cloud security
- Cloud security management
- Early detection and mitigation of cybersecurity risks
- Notifications about detected security issues
- Assessment of compliance with Yandex Cloud Security, 152-FZ, FSTEC, PCI-DSS, and CIS standards
- Cloud resource inventory and control
- Evaluating resource efficiency
Neoflex
Neoflex provides technical support to NeoCAT users in Yandex Cloud from 9 a.m. to 6 p.m. (UTC+3) on business days. You can contact their support by email at clients@neocat.cloud.
Yandex Cloud
Yandex Cloud does not provide technical support for this product. If you have any issues, please refer to the respective developer’s information resources.
Software | Version |
---|---|
Ubuntu | 22.04 LTS |
Docker | 23.0.4, build f480fb1 |
Python | 3.9.5 |
NeoCAT Pro | 2.0.1 |