Data Sources Power RADbot Intelligence
RADbot uses data from your security tools to execute autonomous security actions. Data sources provide the telemetry and context RADbot needs to detect threats, assess risk, and execute automated responses.How Data Enables Security Automation
Threat Detection & Response
RADbot queries cloud providers, SIEMs, and security tools to identify threats in real-time and execute automated responses without human intervention.Risk Assessment & Prioritization
RADbot correlates data across multiple sources to understand security event context and prioritize responses based on business impact.Continuous Learning & Adaptation
RADbot learns from data patterns to improve threat detection accuracy and adapt response strategies to your security environment.Autonomous Orchestration
Data enables RADbot to coordinate security workflows across multiple systems, automatically escalating, containing, and remediating threats.Data Source Categories
Kubernetes
Connect Kubernetes clusters to enable RADbot to analyze misconfigurations, RBAC issues, and image vulnerabilities.
Cloud Providers
AWS, Azure, Google Cloud, and Linode data feeds RADbot with infrastructure telemetry for cloud security monitoring.
Security Tools
SIEM, EDR, vulnerability scanners, and ticketing systems provide RADbot with security event data for comprehensive threat analysis.
Cloud Providers
Connect your cloud infrastructure to RAD Security for comprehensive security monitoring and compliance.Amazon Web Services (AWS)
Monitor AWS resources, EKS clusters, and cloud compliance. Supports EC2, S3, IAM, and more.
Microsoft Azure
Secure Azure resources, AKS clusters, and monitor Azure-specific security controls.
Google Cloud Platform
Monitor GCP resources, GKE clusters, and Google Cloud security best practices.
Linode
Connect Linode infrastructure for comprehensive cloud security monitoring.
Connection Management
Setting Up Cloud Connections
- Access Connection Management: Navigate to Data Sources > Connections in your RAD Security dashboard
- Add Provider: Click “Add Provider” and select your cloud provider
- Configure Credentials: Follow the provider-specific setup guide
- Verify Connection: Ensure the connection shows as “Active” status
Connection Health Monitoring
RAD Security continuously monitors your cloud connections to ensure:- Authentication Status: Verifies credentials are valid and not expired
- API Connectivity: Tests communication with cloud provider APIs
- Data Ingestion: Confirms security data is being collected properly
- Compliance Scanning: Validates that compliance checks are running
Supported Cloud Services
AWS Services
AWS Services
- Compute: EC2, ECS, Lambda, EKS
- Storage: S3, EBS, EFS
- Security: IAM, CloudTrail, GuardDuty, Security Hub
- Networking: VPC, Security Groups, NACLs
- Compliance: Config, CloudFormation, CloudWatch
Azure Services
Azure Services
- Compute: Virtual Machines, AKS, Container Instances
- Storage: Blob Storage, Managed Disks, File Storage
- Security: Azure AD, Security Center, Sentinel
- Networking: Virtual Networks, NSGs, Application Gateway
- Compliance: Azure Policy, Blueprints, Compliance Manager
Google Cloud Services
Google Cloud Services
- Compute: Compute Engine, GKE, Cloud Functions
- Storage: Cloud Storage, Persistent Disks
- Security: Cloud IAM, Security Command Center
- Networking: VPC, Firewall Rules, Cloud Armor
- Compliance: Cloud Asset Inventory, Security Health Analytics
Linode Services
Linode Services
- Compute: Linode Instances, Kubernetes Engine
- Storage: Block Storage, Object Storage
- Networking: VPC, NodeBalancers, Firewalls
- Security: Cloud Firewall, Managed Services
Getting Started
Ready to connect your cloud infrastructure? Follow these quick start guides:- AWS Setup Guide - Connect your AWS account
- Azure Setup Guide - Connect your Azure subscription
- Google Cloud Setup Guide - Connect your GCP project
- Terraform Integration - Infrastructure as Code setup
Next Steps
After connecting your cloud providers:- Review Security Findings: Check the Risk & Posture section for any immediate security issues
- Configure Alerts: Set up notifications for critical security events
- Enable Compliance Scanning: Activate compliance monitoring for your industry standards
- Set Up Workflows: Create automated responses to security events