Platform
Plerion Platform
Asset inventory
Misconfigurations
Vulnerabilities
Breach detection
Permissions
Data security
Infrastructure as code
Compliance
Software composition
Explore the platform →
Integrations →
Supported clouds →
Use cases →
Use cases
Find & prioritize vulnerabilities
Identify the 1% of risk that matters
Understand what's in your cloud
Know who has access to what
Work where you already work
Resources
Blog
Cloud knowledge base
Customers
Company
About
Careers
Contact
Partnerships
Home
Platform
Asset Inventory
Misconfigurations
Vulnerabilities
Permissions
Breach Detection
Data Security
Infrastructure as Code
Compliance
Software Composition
Explore The Platform
Use Cases
Find & prioritize vulnerabilities
Identify the 1% of risk that matters
Understand what's in your cloud
Know who has access to what
Work where you already work
Resources
Blog
Cloud knowledge base
Customers
Company
About us
Careers
Contact us
Trust center
Get a demo
Sign up
Sign in
CLOUD KNOWLEDGE BASE
Cloud security articles
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Next
CSA CCM A&A-05
Audit Management Process
CSA CCM CCC-09
Change Restoration
CSA CCM BCR-07
Communication
CIS AWS 3.7
Ensure VPC flow logging is enabled in all VPCs
CSA CCM HRS-09
Personnel Roles and Responsibilities
CSA CCM HRS-02
Acceptable Use of Technology Policy and Procedures
CSA CCM LOG-12
Access Control Logs
CSA CCM UEM-09
Anti-Malware Detection and Prevention
CSA CCM IPY-02
Application Interface Availability
CSA CCM AIS-02
Application Security Baseline Requirements
CSA CCM AIS-03
Application Security Metrics
CSA CCM AIS-07
Application Vulnerability Remediation
CSA CCM AIS-01
Application and Interface Security Policy and Procedures
CSA CCM UEM-02
Application and Service Approval
CSA CCM HRS-05
Asset Returns
CSA CCM DCS-06
Assets Cataloguing and Tracking
CSA CCM DCS-05
Assets Classification
CSA CCM LOG-04
Audit Logs Access and Accountability
CSA CCM LOG-05
Audit Logs Monitoring and Response
CSA CCM LOG-02
Audit Logs Protection
CSA CCM A&A-01
Audit and Assurance Policy and Procedures
CSA CCM IAM-16
Authorization Mechanisms
CSA CCM AIS-05
Automated Application Security Testing
CSA CCM AIS-06
Automated Secure Application Deployment
CSA CCM UEM-06
Automatic Lock Screen
CSA CCM HRS-01
Background Screening Policy and Procedures
CSA CCM BCR-08
Backup
CSA CCM BCR-06
Business Continuity Exercises
CSA CCM BCR-01
Business Continuity Management Policy and Procedures
CSA CCM BCR-04
Business Continuity Planning
CSA CCM BCR-03
Business Continuity Strategy
CSA CCM CEK-02
CEK Roles and Responsibilities
CSA CCM CEK-08
CSC Key Management Capability
CSA CCM IAM-11
CSCs Approval for Agreed Privileged Access Roles
CSA CCM DCS-12
Cabling Security
CSA CCM IVS-02
Capacity and Resource Planning
CSA CCM CCC-05
Change Agreements
CSA CCM CCC-01
Change Management Policy and Procedures
CSA CCM CCC-03
Change Management Technology
CSA CCM HRS-03
Clean Desk Policy and Procedures
CSA CCM LOG-06
Clock Synchronization
CSA CCM UEM-03
Compatibility
CSA CCM HRS-13
Compliance User Responsibility
CSA CCM DCS-07
Controlled Access Points
CSA CCM DSP-04
Data Classification
CSA CCM CEK-03
Data Encryption
CSA CCM DSP-05
Data Flow Documentation
CSA CCM DSP-03
Data Inventory
CSA CCM DSP-19
Data Location
CSA CCM UEM-11
Data Loss Prevention
CSA CCM DSP-06
Data Ownership and Stewardship
CSA CCM IPY-04
Data Portability Contractual Obligations
CSA CCM DSP-08
Data Privacy by Design and Default
CSA CCM DSP-09
Data Protection Impact Assessment
CSA CCM DSP-07
Data Protection by Design and Default
CSA CCM DSP-16
Data Retention and Deletion
CSA CCM DSP-01
Data Security and Privacy Policy and Procedures
CSA CCM TVM-04
Detection Updates
CSA CCM CCC-07
Detection of Baseline Deviation
CSA CCM BCR-09
Disaster Response Plan
CSA CCM DSP-18
Disclosure Notification
CSA CCM DSP-14
Disclosure of Data Sub-processors
CIS AWS 1.11
Do not setup access keys during initial user setup for all IAM users that have a console password
CSA CCM BCR-05
Documentation
EFS access points should be configured to enforce a user identity
EFS access points should be configured to enforce a user identity
ElastiCache Redis cache clusters should use authentication tokens
ElastiCache Redis cache clusters should use authentication tokens
CIS AWS 1.7
Eliminate use of the 'root' user for administrative and daily tasks
CSA CCM HRS-08
Employment Agreement Content
CSA CCM HRS-07
Employment Agreement Process
CSA CCM HRS-06
Employment Termination
Enable Auto Scaling for DynamoDB tables
Enable Auto Scaling for DynamoDB tables
Enable Point-in-Time Recovery (PITR) for Dynamodb global tables
Enable Point-in-Time Recovery (PITR) for Dynamodb global tables
Enable X-Ray tracing for Lambda functions
Enable X-Ray tracing for Lambda functions
Enable logging for API Gateway REST and WebSocket APIs
Enable logging for API Gateway REST and WebSocket APIs
CSA CCM CEK-04
Encryption Algorithm
CSA CCM CEK-06
Encryption Change Cost Benefit Analysis
CSA CCM CEK-05
Encryption Change Management
CSA CCM LOG-10
Encryption Monitoring and Reporting
CSA CCM CEK-07
Encryption Risk Management
CSA CCM CEK-09
Encryption and Key Management Audit
CSA CCM CEK-01
Encryption and Key Management Policy and Procedures
CSA CCM UEM-01
Endpoint Devices Policy and Procedures
CSA CCM UEM-04
Endpoint Inventory
CSA CCM UEM-05
Endpoint Management
CIS AWS 4.9
Ensure AWS Config configuration changes are monitored (Manual)
CIS AWS 3.3
Ensure AWS Config is enabled in all regions
CIS AWS 4.6
Ensure AWS Management Console authentication failures are monitored
CIS AWS 4.15
Ensure AWS Organizations changes are monitored
CIS AWS 4.16
Ensure AWS Security Hub is enabled
CIS AWS 2.3.2
Ensure Auto Minor Version Upgrade feature is Enabled for RDS Instances
CIS AWS 4.5
Ensure CloudTrail configuration changes are monitored
CIS AWS 3.1
Ensure CloudTrail is enabled in all regions
CIS AWS 3.2
Ensure CloudTrail log file validation is enabled
CIS AWS 3.5
Ensure CloudTrail logs are encrypted at rest using KMS CMKs
CIS AWS 2.2.1
Ensure EBS Volume Encryption is Enabled in all Regions
CIS AWS 1.18
Ensure IAM instance roles are used for AWS resource access from instances
CIS AWS 1.9
Ensure IAM password policy prevents password reuse
CIS AWS 1.8
Ensure IAM password policy requires minimum length of 14 or greater
CIS AWS 1.16
Ensure IAM policies that allow full ":" administrative privileges are not attached
CIS AWS 4.4
Ensure IAM policy changes are monitored
Blog
Learn cloud security with our research blog
Your queues, your responsibility
August 20, 2024
Things you wish you didn't need to know about S3
May 30, 2024
S3 Bucket Encryption Doesn't Work The Way You Think It Works
April 19, 2024
Read more