Platform
Plerion Platform
Asset inventory
Misconfigurations
Vulnerabilities
Breach detection
Permissions
Data security
Infrastructure as code
Compliance
Software composition
Explore the platform →
Integrations →
Supported clouds →
Use cases →
Use cases
Find & prioritize vulnerabilities
Identify the 1% of risk that matters
Understand what's in your cloud
Know who has access to what
Work where you already work
Resources
Blog
Cloud knowledge base
Customers
Company
About
Careers
Contact
Partnerships
Home
Platform
Asset Inventory
Misconfigurations
Vulnerabilities
Permissions
Breach Detection
Data Security
Infrastructure as Code
Compliance
Software Composition
Explore The Platform
Use Cases
Find & prioritize vulnerabilities
Identify the 1% of risk that matters
Understand what's in your cloud
Know who has access to what
Work where you already work
Resources
Blog
Cloud knowledge base
Customers
Company
About us
Careers
Contact us
Trust center
Get a demo
Sign up
Sign in
CLOUD KNOWLEDGE BASE
Cloud security articles
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Next
CSA CCM HRS-02
Acceptable Use of Technology Policy and Procedures
CSA CCM LOG-12
Access Control Logs | Plerion
CSA CCM UEM-09
Anti-Malware Detection and Prevention
CSA CCM IPY-02
Application Interface Availability
CSA CCM AIS-02
Application Security Baseline Requirements
CSA CCM AIS-03
Application Security Metrics | Plerion
CSA CCM AIS-07
Application Vulnerability Remediation
CSA CCM AIS-01
Application and Interface Security Policy and Procedures
CSA CCM UEM-02
Application and Service Approval
CSA CCM HRS-05
Asset Returns | Plerion
CSA CCM DCS-06
Assets Cataloguing and Tracking
CSA CCM DCS-05
Assets Classification | Plerion
CSA CCM LOG-04
Audit Logs Access and Accountability
CSA CCM LOG-05
Audit Logs Monitoring and Response
CSA CCM LOG-02
Audit Logs Protection | Plerion
CSA CCM A&A-05
Audit Management Process | Plerion
CSA CCM A&A-01
Audit and Assurance Policy and Procedures
CSA CCM IAM-16
Authorization Mechanisms | Plerion
CSA CCM AIS-05
Automated Application Security Testing
CSA CCM AIS-06
Automated Secure Application Deployment
CSA CCM UEM-06
Automatic Lock Screen | Plerion
CIS AWS 1.7
Avoid 'Root' User Usage for Administrative and Daily Tasks
CIS AWS 1.11
Avoid Access Keys During Setup for IAM users with Password
CIS AWS 1.16
Avoid Attaching IAM Policies With Full ":" Admin Rights
CSA CCM HRS-01
Background Screening Policy and Procedures
CSA CCM BCR-08
Backup | Plerion
CIS AWS 5.1
Block NACL Ingress From 0.0.0.0/0 to Server Admin Ports
CIS AWS 2.1.4
Block Public Access on All S3 Bucket Configurations
CIS AWS 5.2
Block Security Group Ingress From 0.0.0.0/0 to Admin Ports
CIS AWS 5.3
Block Security Group Ingress From ::/0 to Server Admin Ports
CSA CCM BCR-06
Business Continuity Exercises | Plerion
CSA CCM BCR-01
Business Continuity Management Policy and Procedures
CSA CCM BCR-04
Business Continuity Planning | Plerion
CSA CCM BCR-03
Business Continuity Strategy | Plerion
CSA CCM CEK-02
CEK Roles and Responsibilities
CSA CCM CEK-08
CSC Key Management Capability | Plerion
CSA CCM IAM-11
CSCs Approval for Agreed Privileged Access Roles
CSA CCM DCS-12
Cabling Security | Plerion
CSA CCM IVS-02
Capacity and Resource Planning
CSA CCM CCC-05
Change Agreements | Plerion
CSA CCM CCC-01
Change Management Policy and Procedures
CSA CCM CCC-03
Change Management Technology | Plerion
CSA CCM CCC-09
Change Restoration | Plerion
CIS AWS 2.1.3
Classify and Secure Amazon S3 Data When Necessary
CSA CCM HRS-03
Clean Desk Policy and Procedures
CSA CCM LOG-06
Clock Synchronization | Plerion
CSA CCM BCR-07
Communication | Plerion
CSA CCM UEM-03
Compatibility | Plerion
CSA CCM HRS-13
Compliance User Responsibility
EFS access points should be configured to enforce a user identity
Configure EFS Access Points to Enforce User Identity
CSA CCM DCS-07
Controlled Access Points | Plerion
CIS AWS 1.17
Create a Support Role for Managing AWS Support Incidents
CSA CCM DSP-04
Data Classification | Plerion
CSA CCM CEK-03
Data Encryption | Plerion
CSA CCM DSP-05
Data Flow Documentation | Plerion
CSA CCM DSP-03
Data Inventory | Plerion
CSA CCM DSP-19
Data Location | Plerion
CSA CCM UEM-11
Data Loss Prevention | Plerion
CSA CCM DSP-06
Data Ownership and Stewardship
CSA CCM IPY-04
Data Portability Contractual Obligations
CSA CCM DSP-08
Data Privacy by Design and Default
CSA CCM DSP-09
Data Protection Impact Assessment
CSA CCM DSP-07
Data Protection by Design and Default
CSA CCM DSP-16
Data Retention and Deletion | Plerion
CSA CCM DSP-01
Data Security and Privacy Policy and Procedures
CIS AWS 5.4
Default VPC Security Groups Should Restrict All Traffic
CSA CCM TVM-04
Detection Updates | Plerion
CSA CCM CCC-07
Detection of Baseline Deviation
CIS AWS 1.12
Disable Credentials Unused for 45 Days or Longer
CSA CCM BCR-09
Disaster Response Plan | Plerion
CSA CCM DSP-18
Disclosure Notification | Plerion
CSA CCM DSP-14
Disclosure of Data Sub-processors
CSA CCM BCR-05
Documentation | Plerion
CSA CCM HRS-08
Employment Agreement Content | Plerion
CSA CCM HRS-07
Employment Agreement Process | Plerion
CSA CCM HRS-06
Employment Termination | Plerion
CIS AWS 2.3.2
Enable Auto Minor Version Upgrade for All RDS Instances
Enable Auto Scaling for DynamoDB tables
Enable Auto Scaling for DynamoDB tables
CIS AWS 1.10
Enable MFA for All IAM Users With a Console Password
CIS AWS 3.9
Enable Object-Level Logging for Read Events on S3 Buckets
CIS AWS 3.8
Enable Object-Level Logging for Write Events on S3 Buckets
Enable Point-in-Time Recovery (PITR) for Dynamodb global tables
Enable Point-in-Time Recovery (PITR) for DynamoDB Tables
CIS AWS 3.6
Enable Rotation for Customer-Created Symmetric CMKs
CIS AWS 3.4
Enable S3 Bucket Access Logging on the CloudTrail S3 Bucket
Enable X-Ray tracing for Lambda functions
Enable X-Ray tracing for Lambda functions
Enable logging for API Gateway REST and WebSocket APIs
Enable logging for API Gateway REST and WebSocket APIs
CSA CCM CEK-04
Encryption Algorithm | Plerion
CSA CCM CEK-06
Encryption Change Cost Benefit Analysis
CSA CCM CEK-05
Encryption Change Management | Plerion
CSA CCM LOG-10
Encryption Monitoring and Reporting
CSA CCM CEK-07
Encryption Risk Management | Plerion
CSA CCM CEK-09
Encryption and Key Management Audit
CSA CCM CEK-01
Encryption and Key Management Policy and Procedures
CSA CCM UEM-01
Endpoint Devices Policy and Procedures
CSA CCM UEM-04
Endpoint Inventory | Plerion
CSA CCM UEM-05
Endpoint Management | Plerion
CIS AWS 4.9
Ensure AWS Config Configuration Changes are Monitored
CIS AWS 3.3
Ensure AWS Config is enabled in all regions
CIS AWS 4.15
Ensure AWS Organizations changes are monitored
CIS AWS 4.16
Ensure AWS Security Hub is enabled
Blog
Learn cloud security with our research blog
What Do Hackers Know About Your AWS Account?
November 26, 2024
Your Queues, Your Responsibility
August 20, 2024
Things you wish you didn't need to know about S3
May 30, 2024
Read more