Skip to main content

Data Sources Power RADbot Intelligence

RADbot uses data from your security tools to execute autonomous security actions. Data sources provide the telemetry and context RADbot needs to detect threats, assess risk, and execute automated responses.

How Data Enables Security Automation

Threat Detection & Response

RADbot queries cloud providers, SIEMs, and security tools to identify threats in real-time and execute automated responses without human intervention.

Risk Assessment & Prioritization

RADbot correlates data across multiple sources to understand security event context and prioritize responses based on business impact.

Continuous Learning & Adaptation

RADbot learns from data patterns to improve threat detection accuracy and adapt response strategies to your security environment.

Autonomous Orchestration

Data enables RADbot to coordinate security workflows across multiple systems, automatically escalating, containing, and remediating threats.

Data Source Categories

Cloud Providers

Connect your cloud infrastructure to RAD Security for comprehensive security monitoring and compliance.

Connection Management

Setting Up Cloud Connections

  1. Access Connection Management: Navigate to Data Sources > Connections in your RAD Security dashboard
  2. Add Provider: Click “Add Provider” and select your cloud provider
  3. Configure Credentials: Follow the provider-specific setup guide
  4. Verify Connection: Ensure the connection shows as “Active” status

Connection Health Monitoring

RAD Security continuously monitors your cloud connections to ensure:
  • Authentication Status: Verifies credentials are valid and not expired
  • API Connectivity: Tests communication with cloud provider APIs
  • Data Ingestion: Confirms security data is being collected properly
  • Compliance Scanning: Validates that compliance checks are running

Supported Cloud Services

  • Compute: EC2, ECS, Lambda, EKS
  • Storage: S3, EBS, EFS
  • Security: IAM, CloudTrail, GuardDuty, Security Hub
  • Networking: VPC, Security Groups, NACLs
  • Compliance: Config, CloudFormation, CloudWatch
  • Compute: Virtual Machines, AKS, Container Instances
  • Storage: Blob Storage, Managed Disks, File Storage
  • Security: Azure AD, Security Center, Sentinel
  • Networking: Virtual Networks, NSGs, Application Gateway
  • Compliance: Azure Policy, Blueprints, Compliance Manager
  • Compute: Compute Engine, GKE, Cloud Functions
  • Storage: Cloud Storage, Persistent Disks
  • Security: Cloud IAM, Security Command Center
  • Networking: VPC, Firewall Rules, Cloud Armor
  • Compliance: Cloud Asset Inventory, Security Health Analytics
  • Compute: Linode Instances, Kubernetes Engine
  • Storage: Block Storage, Object Storage
  • Networking: VPC, NodeBalancers, Firewalls
  • Security: Cloud Firewall, Managed Services

Getting Started

Ready to connect your cloud infrastructure? Follow these quick start guides:

Next Steps

After connecting your cloud providers:
  1. Review Security Findings: Check the Risk & Posture section for any immediate security issues
  2. Configure Alerts: Set up notifications for critical security events
  3. Enable Compliance Scanning: Activate compliance monitoring for your industry standards
  4. Set Up Workflows: Create automated responses to security events