Forticnp: Prioritize Risk Management Activities
Forticnp: Prioritize Risk Management Activities
FortiCNP
Available for:
Cloud
1
DATA SHEET | FortiCNP
FEATURE HIGHLIGHTS
2 2
DATA SHEET | FortiCNP
TECHNICAL SPECIFICATIONS
FEATURES
DESCRIPTION INTEGRATIONS
FortiCNP scans and monitors customer cloud AWS Security Hub
Cloud Security Posture
configurations to evaluate best practices and Azure Security Center
Management
detect misconfiguration risk. GCP Security Health Analytics
Vulnerability FortiCNP analyzes the impact of vulnerabilities Amazon Inspector
Management against your cloud resources to assess risk. Microsoft Defender for Cloud
FortiCNP ingests information from Cloud Native Amazon GuardDuty, VPC Flow Logs, CloudTrail
Threat Detection security services and Fortinet products for Microsoft Defender for Cloud, NSG Flow Logs
Workload and Network threat detection findings. CloudTrail, VPC Flow Logs
Entitlement FortiCNP incorporates permission information
Management to correlate the impact of risk across different
resources.
Data Security FortiCNP scans for malware in data and utilizes Amazon S3
data classification information from cloud native Azure Blob
tools to evaluate the impact of security risk on or GCP Cloud Storage
from your data.
Kubernetes Security FortiCNP integrates with Kubernetes Environments Amazon EKS
to scan configuration and monitor traffic flows. Azure AKS
Google Kubernetes Engine
Self-Managed Kubernetes
Container Registries FortiCNP Scans container registries for Amazon ECR
vulnerabilities allowing DevOps teams to pass or Azure Container Registry
fail build pipelines based on scan results. Google Container Registry
Harbor Container Registry
OpenShift Container Registry
Docker Hub
Ticketing and Ci/CD FortiCNP allows security analysts to interact with JIRA
Integration other teams in the ways that are most natural to ServiceNow
the organization. Jenkins
Reports FortiCNP provides point in time risk snapshot and
compliance reports to non FortiCNP users.
AWS SERVICE INTEGRATION DESCRIPTION
Resource API The AWS Resource API is used to collect information regarding your cloud resources in a read-only
manner.
Organizations AWS organizations are used to import environments that include more than a single AWS account
and are organized using the AWS organizations feature.
CloudTrail FortiCNP ingests CloudTrail events to identify changes to your environment.
VPC Flow Logs VPC Flow logs are used to establish traffic patterns in your environment as well as detect deviations
from normal patterns.
Security Hub AWS Security Hub is used to collect all security information from AWS services such as GuardDuty,
Inspector and others. FortiCNP utilizes the finding normalization and aggregation capabilities of
Security Hub. Security Hub Controls are not used by FortiCNP.
GuardDuty GuardDuty Threat Detection Service is used by FortiCNP to cross correlate risk with imminent
threats and prioritize.
Inspector Inspector Vulnerabilities are used to establish package, library and network configuration
vulnerability risk.
3
DATA SHEET | FortiCNP
TECHNICAL SPECIFICATIONS
FEATURES
AZURE SERVICE INTEGRATION DESCRIPTION
REST API The Azure REST API is used to collect information regarding your cloud resources in a read-only
manner.
Azure Log Analytics Azure Log Analytics is used to collect information from the Azure platform and detect any changes
to resource configurations.
Azure NSG Flow NSG Flow Events are used to establish traffic patterns in your environment as well as detect
Events deviations from normal patterns.
Azure Security Center Azure Security Center provides FortiCNP with information from Microsoft Defender for detecting
vulnerabilities and threats for cloud workloads.
GCP INTEGRATION DESCRIPTION
Google Cloud API The GCP API is used to collect information regarding your cloud resources in a read-only manner.
VPC Flow logs are used to establish traffic patterns in your environment as well as detect deviations
GCP VPC Flow Logs
from normal patterns.
Cloud Logs are used to collect information from GCP and detect any changes to resource
Google Cloud Logs
configurations.
4 4
DATA SHEET | FortiCNP
ORDER INFORMATION
PRODUCT SKU DESCRIPTION
BRING YOUR OWN LICENSE (BYOL)
Cloud Native Protection FC1-10-FCWPW-315-02-DD* FortiCNP Cloud Native protection – Risk, Threat and Data insights for 20 resources in all supported public cloud
environments.
FC2-10-FCWPW-315-02-DD* FortiCNP Cloud Native protection – Risk, Threat and Data insights for 100 resources in all supported public cloud
environments.
Data Protection FC2-10-FCWPS-316-02-DD* FortiCNP Data Protection Standard. License for malware and anti-virus scanning of 100GB of data. Requires FortiCNP
protected resource license. Cannot be combined with FortiCNP Data Protection, Advanced.
FC2-10-FCWPS-317-02-DD FortiCNP Data Protection Advanced (Standard plus DLP scanning) - License for pattern-matching (DLP), malware and anti-
virus scanning of 100GB of data. Requires FortiCNP protected resource license. Cannot be combined with FortiCNP Data
Protection, Standard.
FC5-10-FCWPS-316-02-DD FortiCNP Data Protection Standard. License for malware and anti-virus scanning of 1TB of data. Requires FortiCNP
protected resource license. Cannot be combined with FortiCNP Data Protection, Advanced.
FC5-10-FCWPS-317-02-DD* FortiCNP Data Protection Advanced (Standard plus DLP scanning) – License for pattern-matching (DLP), malware and
anti-virus scanning of 1TB of data. Requires FortiCNP protected resource license. Cannot be combined with FortiCNP Data
Protection, Standard.
Container Protection FC1-10-FCWPC-327-02-DD* FortiCNP Container Protection. Subscription per 4 container hosts/worker nodes.
AWS MARKETPLACE
Monthly Base monthly subscription Minimal subscription protecting 20 workloads and scans up-to 100GB of data for malware.
Protected Cloud Resources Additional protected resources that were protected during the month using highest watermark metering. Increments of 1.
Scanned Data Volume of data that has been scanned for the month beyond the first 100GB. Increments of 1.
Annual Base Annual Subscription Minimal subscription protecting 100 workloads and scans up to 1TB of data for malware.
Protected Cloud Resources Allocation of additional protected resources for the year. Increments of 100.
Scanned Data Volume of data scanning capacity beyond the first 1TB. Increments of 10TB.
Overage Any exceeded capacity for protected workloads or data scanning charged per monthly prices.
* Denotes TBA
www.fortinet.com
Copyright © 2022 Fortinet, Inc. All rights reserved. Fortinet®, FortiGate®, FortiCare® and FortiGuard®, and certain other marks are registered trademarks of Fortinet, Inc., and other Fortinet names herein may also be registered and/or common law trademarks of Fortinet. All other product
or company names may be trademarks of their respective owners. Performance and other metrics contained herein were attained in internal lab tests under ideal conditions, and actual performance and other results may vary. Network variables, different network environments and other
conditions may affect performance results. Nothing herein represents any binding commitment by Fortinet, and Fortinet disclaims all warranties, whether express or implied, except to the extent Fortinet enters a binding written contract, signed by Fortinet’s General Counsel, with a purchaser
that expressly warrants that the identified product will perform according to certain expressly-identified performance metrics and, in such event, only the specific performance metrics expressly identified in such binding written contract shall be binding on Fortinet. For absolute clarity, any
such warranty will be limited to performance in the same ideal conditions as in Fortinet’s internal lab tests. Fortinet disclaims in full any covenants, representations, and guarantees pursuant hereto, whether express or implied. Fortinet reserves the right to change, modify, transfer, or otherwise
revise this publication without notice, and the most current version of the publication shall be applicable.
Fortinet is committed to driving progress and sustainability for all through cybersecurity, with respect for human rights and ethical business practices, making possible a digital world you can always trust. You represent and warrant to Fortinet that you will not use Fortinet’s
products and services to engage in, or support in any way, violations or abuses of human rights, including those involving illegal censorship, surveillance, detention, or excessive use of force. Users of Fortinet products are required to comply with the Fortinet EULA
(https://www.fortinet.com/content/dam/fortinet/assets/legal/EULA.pdf) and report any suspected violations of the EULA via the procedures outlined in the Fortinet Whistleblower Policy (https://secure.ethicspoint.com/domain/media/en/gui/19775/Whistleblower_Policy.pdf).
FCNP-DAT-R01-20220707