Platform
Plerion Platform
Top risks
Attack paths
Kubernetes misconfigurations
Asset inventory
Misconfigurations
Vulnerabilities
Breach detection
Permissions
Data security
Code security
Compliance
Software composition
Explore the platform →
Integrations →
Supported clouds →
Use cases →
Pleri AI
Meet Pleri
Pleri skills & capabilities
Pleri docs
Customers
Resources
Blog
Cloud knowledge base
Platform Documentation
API Reference
Company
About
Careers
Contact
Partnerships
Trust Center
Pricing
Home
Pleri AI
Pleri skills & capabilities
Pleri docs
Customers
Platform
Top risks
Kuberenets misconfigurations
Asset Inventory
Misconfigurations
Vulnerabilities
Permissions
Breach Detection
Data Security
Code security
Compliance
Software Composition
Explore The Platform
Use Cases
Find & prioritize vulnerabilities
Identify the 1% of risk that matters
Understand what's in your cloud
Know who has access to what
Work where you already work
Resources
Blog
Cloud knowledge base
Platform Documentation
API Reference
Company
About us
Careers
Contact us
Trust center
Pricing
Get a demo
Sign up
Sign in
Cloud knowledge base
Explore guides, insights, and controls to simplify cloud security.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Solutions
Vulnerability scanning platforms Copy
Learn more about this essential cloud security topic
Solutions
Security training and certification Copy 3
Learn more about this essential cloud security topic
Solutions
Security training and certification Copy 2
Learn more about this essential cloud security topic
Solutions
Security training and certification Copy
Learn more about this essential cloud security topic
Solutions
Security training and certification
Learn more about this essential cloud security topic
Solutions
Vulnerability scanning platforms
Learn more about this essential cloud security topic
Solutions
Cloud-native firewall solutions
Learn more about this essential cloud security topic
Solutions
API gateway security features
Learn more about this essential cloud security topic
Solutions
Container security tools overview
Learn more about this essential cloud security topic
Solutions
Security automation platforms
Learn more about this essential cloud security topic
Solutions
Cloud backup and disaster recovery
Learn more about this essential cloud security topic
Solutions
Identity provider integration guide
Learn more about this essential cloud security topic
Solutions
Choosing the right SIEM for cloud
Learn more about this essential cloud security topic
Solutions
Cloud security platform comparison
Learn more about this essential cloud security topic
Glossary
What is defense in depth?
Layered security approach with multiple protective measures
Glossary
What is least privelage
Security principle of granting minimum necessary permissions
Glossary
What is RBAC?
Role-Based Access Control for permission management
Glossary
What is IAM?
Identity and Access Management for controlling resources access
Glossary
What is zero trust?
Security model that assumes no implicit trust in any network
Glossary
What is SOAR?
Security Orchestration, Automation and Response for incident handling
Glossary
What is SIEM?
Security information and Event Management for threat detection
Glossary
What is CNAPP?
Cloud-Native Application Protection Platform for comprehensive security
Glossary
What is CWPP?
Cloud Workload Protection Platform for runtime security
Glossary
What is CSPM?
Cloud Security Posture Management for continuous compliance monitoring
Threats and incidends
Cloud ransomware protection
Defend against ransomware attacks targeting cloud data
Threats and incidends
Insider threat mitigation
Implement controls to detect and prevent internal security risks
Threats and incidends
Data exfiltration techniques
Understand and prevent unauthorized data transfers
Threats and incidends
Cryptojacking detection and prevention
Protect your cloud resources from cryptocurrency mining attacks
Threats and incidends
Supply chain attack prevention
Secure your software supply chain and dependencies
Threats and incidends
Detecting privilage escalation
Identify attempts to gain unauthorized elevated permissions
Threats and incidends
API security best practices
Protect your APIs from unauthorized access and abuse
Threats and incidends
Container security vulnerabilities
Secure your containerized applications from common exploits
Threats and incidends
Understanding lateral movement in cloud
Detect and prevent attackers moving between cloud resources
Explainers
Cloud security monitoring essentials
Set up effective monitoring and alerting for security events
Explainers
AWS Organizations and account structure
Design secure multi-account architectures for enterprise scale
Explainers
Security groups vs network ACLs
Understand the differences and when to use each network control
Explainers
Encryption at rest and in transit
Protect your data with comprehensive encryption strategies
Explainers
Multi-factor authentication implementation
Step-by-step guide implementing MFA across your organization
Explainers
Introduction to zero trust archetecture
Explore the principles of never trust, always verify security model
Explainers
Common AWS misconfigurations to avoid
Identify and fix the most critical security misconfigurations
Explainers
CloudTrail configuration best practices
Essential logging configurations for comprehensive audit trails
How-to guides and playbooks
Cloud cost optimization and security
Balance security requirements with cost efficiency
How-to guides and playbooks
DevSecOps implementation
Integrate security throughout your development lifecycle
How-to guides and playbooks
Severless security guidelines
Protect serverless function and event-driven architectures
How-to guides and playbooks
Container orchestration security
Secure Kubernetes and container orchestration platforms
How-to guides and playbooks
Infrastructure as code security
Scan and secure your IaC templates before deployment
How-to guides and playbooks
Security automation workflows
Streamline security operations with automated remediation
How-to guides and playbooks
Incident response playbooks
Prepare your team with documented response prodcdures
How-to guides and playbooks
Network segmentation patterns
Design secure network architectures with proper isolation
How-to guides and playbooks
Secrets management in production
Securely store and rotate credentials and API keys
How-to guides and playbooks
Multi-cloud security strategy
Implement consistent security across multiple cloud providers
Compliance control summaries
Data residency and sovereignty
Navigate data location requirements across juridisictions
Compliance control summaries
Compliance automation strategies
Reduce manual effort with automated compliance workflows
Compliance control summaries
ISO 27001 certification guide
Prepare your organization for information security certification
Compliance control summaries
PCI DSS cloud security requirements
Meet payment card industry standards in the cloud
Compliance control summaries
HIPAA compliance in AWS
Automate compliance checks with infrastructure as code
Compliance control summaries
Audit logging best practices
Comprehensive logging strategies for compliance and forensics
Compliance control summaries
Implementing policy as code
Automate compliance checks with infrastructure as code
Compliance control summaries
CIS benchmarks explained
Implement industry-standard security configuration baselines.
Compliance control summaries
GDPR requirements in cloud environments
Ensure data privacy compliance in your cloud infrastructure
Explainers
What is cloud security posture management (CSPM)?
Understand how CSPM tools help identify and remediate cloud misconfigurations
Explainers
Understanding IAM roles and policies
Learn how to implement least privilege access with IAM best practices
Compliance control summaries
SOC 2 compliance for cloud infrastructure
Navigate SOC 2 Type II requirements for cloud-based systems
Compliance control summaries
Understanding SOC 2 Type II requirements for cloud infrastructure
A comprehensive guide to implementing SOC 2 Type II controls in your cloud environment, covering security, availability, and confidentiality.
How-to guides and playbooks
AWS security best practices: a complete checklist
Essential security configurations and best practices for securing your AWS infrastructure, from IAM to network controls.
Threats and incidends
Top 10 cloud security threats in 2025
Explore the most critical security threats facing cloud environments and how to protect against emerging attack vectors.
Latest reads
Guides
Understanding SOC 2 Type II requirements for cloud infrastructure
A comprehensive guide to implementing SOC 2 Type II controls in your cloud environment, covering security, availability, and confidentiality.
Guides
AWS security best practices: a complete checklist
Essential security configurations and best practices for securing your AWS infrastructure, from IAM to network controls.
Threats
Top 10 cloud security threats in 2025
Explore the most critical security threats facing cloud environments and how to protect against emerging attack vectors.
Expand all
Collapse all
Compliance control summaries
Navigate regulatory requirements and maintain compliance
View all
How-to guides and playbooks
Proven strategies for securing your cloud environment
View all
Explainers
Learn the basics of IAM, encryption, and key management
View all
Threats and incidends
Identify and mitigate cloud security risks
View all
Glossary
Essential cloud security terms and definitions
View all
Solutions
Tools and platforms to enhance your cloud security posture
View all
Popular reads
Explainers
What is cloud security posture management (CSPM)?
Understand how CSPM tools help identify and remediate cloud misconfigurations
Explainers
Understanding IAM roles and policies
Learn how to implement least privilege access with IAM best practices
Compliance control summaries
SOC 2 compliance for cloud infrastructure
Navigate SOC 2 Type II requirements for cloud-based systems