Camp Rubrik: Data Security Foundations
  • Camp Rubrik: Data Security Foundations
    • Lab environment
    • Welcome to Zaffre
      • Tools you will be leveraging
      • SLA driven policy engine
      • Role Based Access Control (RBAC)
      • In-place Recovery Plans
    • Identify and Recover from an attack
      • The attack
        • Navigate the two storefronts
        • Ransom note
      • Anomaly Detection
        • Accessing Anomaly Detection
        • Visibility into the attack
        • Investigations page
        • Determining blast radius
        • Instant file recovery
      • Threat Hunting
        • Identifying the entry point of an adversary
        • Building a threat hunt
        • Monitoring a threat hunt in progress
        • Review a completed hunt
      • Sensitive Data Monitoring
        • Accessing Sensitive Data Monitoring
        • Visibility into sensitive data
        • Cyber incident response
        • Business as usual
        • Policies
        • Analyzers
        • Custom analyzers & policies
        • Reporting
      • All Clear To Recover
      • Cyber Recovery
        • Accessing Cyber Recovery
        • Forensic Analysis
        • Recovery Plans
        • In-Place recovery
      • Data Security Command Center
        • Accessing Data Security Command Center
        • Platform Security
        • Anomaly Detection
        • Data Security Posture
        • Data Protection and Recovery
        • Multi-factor Authentication (MFA) with Time-based One-Time Passwords (TOTP)
      • Conclusion
Powered by GitBook
On this page
  • Data Security Command Center
  • Accessing Data Security Command Center
Export as PDF
  1. Camp Rubrik: Data Security Foundations
  2. Identify and Recover from an attack
  3. Data Security Command Center

Accessing Data Security Command Center

PreviousData Security Command CenterNextPlatform Security

Last updated 1 year ago

Data Security Command Center

Data Security Command Center (DSCC) is a SaaS service that provides visibility into an organization’s data risks and security gaps, as well as offers recommendations to improve overall security posture. It radically simplifies data risk management by using a single control plane for global visibility and collaboration.

Accessing Data Security Command Center

If you haven't already connected to the Rubrik Security Cloud, head back to the .

Once you're logged in, click the app-tray icon in the top right of the user interface, then select Data Security Command Center.

As you can see, DSCC presents an overall score with 4 pillars: Platform Security, Data Protection and Recovery, Anomaly Detection, and Data Security Posture with individual metrics. The collection of scores across the pillars is combined to provide an overall data security score, serving as a single source of truth for the entire Rubrik data environment.

You can now explore each pillar to understand how to improve the security posture.

lab environment
Access DSCC