Skip to main content

Data Sources Power RADbot Intelligence

RADbot uses data from your security tools to execute autonomous security actions. Data sources provide the telemetry and context RADbot needs to detect threats, assess risk, and execute automated responses.

How Data Enables Security Automation

Threat Detection & Response

RADbot queries cloud providers, SIEMs, and security tools to identify threats in real-time and execute automated responses without human intervention.

Risk Assessment & Prioritization

RADbot correlates data across multiple sources to understand security event context and prioritize responses based on business impact.

Continuous Learning & Adaptation

RADbot learns from data patterns to improve threat detection accuracy and adapt response strategies to your security environment.

Autonomous Orchestration

Data enables RADbot to coordinate security workflows across multiple systems, automatically escalating, containing, and remediating threats.

Data Source Categories

Kubernetes

Connect Kubernetes clusters to enable RADbot to analyze misconfigurations, RBAC issues, and image vulnerabilities.

Cloud Providers

AWS, Azure, Google Cloud, and Linode data feeds RADbot with infrastructure telemetry for cloud security monitoring.

Security Tools

SIEM, EDR, vulnerability scanners, and ticketing systems provide RADbot with security event data for comprehensive threat analysis.

Cloud Providers

Connect your cloud infrastructure to RAD Security for comprehensive security monitoring and compliance.

Amazon Web Services (AWS)

Monitor AWS resources, EKS clusters, and cloud compliance. Supports EC2, S3, IAM, and more.

Microsoft Azure

Secure Azure resources, AKS clusters, and monitor Azure-specific security controls.

Google Cloud Platform

Monitor GCP resources, GKE clusters, and Google Cloud security best practices.

Linode

Connect Linode infrastructure for comprehensive cloud security monitoring.

Security Tools

Connect security tools and platforms to enhance RADbot’s threat detection and response capabilities.

SIEM

Forward security events and logs to Splunk, Rapid7 InsightIDR, and CrowdStrike NextGen SIEM.

EDR

Integrate endpoint detection and response tools including CrowdStrike, SentinelOne, and Microsoft Defender.

Vulnerability Scanners

Import vulnerability data from Qualys, Tenable, Rapid7 InsightVM, and CrowdStrike Spotlight.

Ticketing Systems

Automate ticket creation and management with Jira Cloud and Torq integrations.

Identity & Access

Connect identity providers including Okta, Microsoft Entra ID, and Google Workspace.

Connection Management

Setting Up Cloud Connections

  1. Access Connection Management: Navigate to Data Sources > Connections in your RAD Security dashboard
  2. Add Provider: Click “Add Provider” and select your cloud provider
  3. Configure Credentials: Follow the provider-specific setup guide
  4. Verify Connection: Ensure the connection shows as “Active” status

Connection Health Monitoring

RAD Security continuously monitors your cloud connections to ensure:
  • Authentication Status: Verifies credentials are valid and not expired
  • API Connectivity: Tests communication with cloud provider APIs
  • Data Ingestion: Confirms security data is being collected properly
  • Compliance Scanning: Validates that compliance checks are running

Supported Cloud Services

  • Compute: EC2, ECS, Lambda, EKS
  • Storage: S3, EBS, EFS
  • Security: IAM, CloudTrail, GuardDuty, Security Hub
  • Networking: VPC, Security Groups, NACLs
  • Compliance: Config, CloudFormation, CloudWatch
  • Compute: Virtual Machines, AKS, Container Instances
  • Storage: Blob Storage, Managed Disks, File Storage
  • Security: Azure AD, Security Center, Sentinel
  • Networking: Virtual Networks, NSGs, Application Gateway
  • Compliance: Azure Policy, Blueprints, Compliance Manager
  • Compute: Compute Engine, GKE, Cloud Functions
  • Storage: Cloud Storage, Persistent Disks
  • Security: Cloud IAM, Security Command Center
  • Networking: VPC, Firewall Rules, Cloud Armor
  • Compliance: Cloud Asset Inventory, Security Health Analytics
  • Compute: Linode Instances, Kubernetes Engine
  • Storage: Block Storage, Object Storage
  • Networking: VPC, NodeBalancers, Firewalls
  • Security: Cloud Firewall, Managed Services

Getting Started

Ready to connect your cloud infrastructure? Follow these quick start guides:

Next Steps

After connecting your cloud providers:
  1. Review Security Findings: Check the Risk & Posture section for any immediate security issues
  2. Configure Alerts: Set up notifications for critical security events
  3. Enable Compliance Scanning: Activate compliance monitoring for your industry standards
  4. Set Up Workflows: Create automated responses to security events