Platform
Plerion Platform
Asset inventory
Misconfigurations
Vulnerabilities
Breach detection
Permissions
Data security
Infrastructure as code
Compliance
Software composition
Explore the platform →
Integrations →
Supported clouds →
Use cases →
Use cases
Find & prioritize vulnerabilities
Identify the 1% of risk that matters
Understand what's in your cloud
Know who has access to what
Work where you already work
Resources
Blog
Cloud knowledge base
Customers
Company
About
Careers
Contact
Partnerships
Home
Platform
Asset Inventory
Misconfigurations
Vulnerabilities
Permissions
Breach Detection
Data Security
Infrastructure as Code
Compliance
Software Composition
Explore The Platform
Use Cases
Find & prioritize vulnerabilities
Identify the 1% of risk that matters
Understand what's in your cloud
Know who has access to what
Work where you already work
Resources
Blog
Cloud knowledge base
Customers
Company
About us
Careers
Contact us
Trust center
Get a demo
Sign up
Sign in
CLOUD KNOWLEDGE BASE
Cloud security articles
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Previous
CSA CCM CCC-02
Quality Testing | Plerion
CSA CCM A&A-06
Remediation | Plerion
CSA CCM UEM-12
Remote Locate | Plerion
CSA CCM UEM-13
Remote Wipe | Plerion
CSA CCM HRS-04
Remote and Home Working Policy and Procedures
CIS AWS 1.19
Remove Expired SSL/TLS Certificates Stored in AWS IAM
CSA CCM A&A-04
Requirements Compliance | Plerion
CSA CCM BCR-10
Response Plan Exercise | Plerion
CSA CCM BCR-02
Risk Assessment and Impact Analysis
CSA CCM A&A-03
Risk Based Planning Assessment
CSA CCM GRC-02
Risk Management Program | Plerion
CSA CCM STA-06
SSRM Control Implementation | Plerion
CSA CCM STA-04
SSRM Control Ownership | Plerion
CSA CCM STA-05
SSRM Documentation Review | Plerion
CSA CCM STA-03
SSRM Guidance | Plerion
CSA CCM STA-01
SSRM Policy and Procedures | Plerion
CSA CCM STA-02
SSRM Supply Chain | Plerion
CSA CCM IAM-12
Safeguard Logs Integrity | Plerion
CSA CCM AIS-04
Secure Application Design and Development
CSA CCM DCS-09
Secure Area Authorization | Plerion
CSA CCM DCS-03
Secure Area Policy and Procedures
CSA CCM DSP-02
Secure Disposal | Plerion
CSA CCM IPY-03
Secure Interoperability and Portability Management
CSA CCM DCS-04
Secure Media Transportation Policy and Procedures
CSA CCM DCS-14
Secure Utilities | Plerion
CSA CCM HRS-11
Security Awareness Training | Plerion
CSA CCM SEF-07
Security Breach Notification | Plerion
CSA CCM SEF-01
Security Incident Management Policy and Procedures
CSA CCM LOG-03
Security Monitoring and Alerting
CSA CCM IVS-06
Segmentation and Segregation | Plerion
CSA CCM IAM-09
Segregation of Privileged Access Roles
CSA CCM DSP-17
Sensitive Data Protection | Plerion
CSA CCM DSP-10
Sensitive Data Transfer | Plerion
CSA CCM IAM-04
Separation of Duties | Plerion
CSA CCM SEF-02
Service Management Policy and Procedures
Ensure that 'Users can add gallery apps to My Apps' is set to 'No'
Set 'Users Can Add Gallery Apps to My Apps' to 'No'
CIS AWS 1.8
Set IAM Password Policy to a Minimum Length of 14 Characters
CSA CCM UEM-10
Software Firewall | Plerion
CSA CCM GRC-08
Special Interest Groups | Plerion
CSA CCM UEM-08
Storage Encryption | Plerion
CSA CCM IAM-14
Strong Authentication | Plerion
CSA CCM IAM-02
Strong Password Policy and Procedures
CSA CCM STA-10
Supply Chain Agreement Review | Plerion
CSA CCM STA-14
Supply Chain Data Security Assessment
CSA CCM STA-13
Supply Chain Governance Review
CSA CCM STA-07
Supply Chain Inventory | Plerion
CSA CCM STA-08
Supply Chain Risk Management | Plerion
CSA CCM STA-12
Supply Chain Service Agreement Compliance
CSA CCM DCS-10
Surveillance System | Plerion
CSA CCM UEM-14
Third-Party Endpoint Security Posture
CSA CCM TVM-01
Threat and Vulnerability Management Policy and Procedures
CSA CCM LOG-11
Transaction/Activity Logging | Plerion
CSA CCM DCS-11
Unauthorized Access Response Training
CSA CCM CCC-04
Unauthorized Change Protection
CSA CCM IAM-13
Uniquely Identifiable Users | Plerion
ElastiCache Redis cache clusters should use authentication tokens
Use Authentication Tokens for ElastiCache Redis Clusters
CIS AWS 1.18
Use IAM Roles for AWS Resource Access From Instances
CSA CCM IAM-07
User Access Changes and Revocation
CSA CCM IAM-06
User Access Provisioning | Plerion
CSA CCM IAM-08
User Access Review | Plerion
CSA CCM TVM-07
Vulnerability Identification | Plerion
CSA CCM TVM-10
Vulnerability Management Metrics
CSA CCM TVM-09
Vulnerability Management Reporting
CSA CCM TVM-09
Vulnerability Prioritization | Plerion
CSA CCM TVM-03
Vulnerability Remediation Schedule
Blog
Learn cloud security with our research blog
Your Queues, Your Responsibility | Plerion
August 20, 2024
Things you wish you didn't need to know about S3
May 30, 2024
S3 Bucket Encryption Doesn't Work The Way You Think It Works
April 19, 2024
Read more