Loading...
Loading...
Configure and monitor security policies across your cloud environment.
| Severity | Rule Name | Category | Status |
|---|---|---|---|
Public bucket contains valid AWS access keys | Data Access | ||
Internet-exposed VM with vulnerable Log4j -> DB with PII | Exposure | ||
RDS publicly exposed with default admin password | Exposure | ||
Internet to PII database via assumed role and cross-account snapshot | Exposure | ||
Public VM with critical CVE leaks DB credentials to a PII database | Exposure | ||
Snapshot with PII shared with another account | Data Access | ||
Internet-facing function reads sensitive bucket | Exposure | ||
Cross-cloud admin identity without MFA | Privilege Escalation | ||
Pod with NET_ADMIN can pivot to cluster-admin role | Privilege Escalation | ||
Lateral movement: shared SSH key reused across staging and prod | lateral_movement | ||
Stale CI service account with prod write access | Privilege Escalation | ||
Unused public IP on stopped VM | configuration |