Ask the community
Security Posture Management
Filters:
By: Partner
CSPM - Query for AWS Instances

Dear community,I am needing to query by API the instances configured for AWS cloud in CSPM. In the official documentation I find queries for creation, read more..

By: Netskope
Setting up IPSec Tunnels for AWS egress traffic

The guides linked to below illustrate how to configure Netskope IPSec tunnels with your AWS environment for egress traffic filtering and monitoring. T read more..

By: Netskope
Netskope AWS Control Tower Integration

The Netskope CSPM and Storage Scan services are multi-account security solutions that provides visibility into resources, configurations, data protect read more..

By: Moderator
CSPM security violation findings' Auto-Remediation for AWS

In this article we’ll demonstrate how you can implement automatic remediation for security posture violation findings discovered by Netskope Cloud Sec read more..

By: Moderator
AWS Best Practices: Real-World Data

We've continued our blog series on AWS Best Practices, and just published:https://www.netskope.com/blog/a-real-world-look-at-aws-best-practices-loggin read more..

By: Moderator
Using custom rules for resource tag and label enforcement

Every company uses tagging and resource labeling in their own way. Among other uses, mature labeling practices are a great way to identify resources t read more..

By: Netskope
Ensure Public buckets donot have a PII tag. (AWS / Azure / GCP)

Organizations have their own convention of tagging buckets containing PII objects . We can leverage Security Posture Management to create custom rules read more..

By: Netskope
Ensure Object ACLs cant be turned public inside private S3 buckets.

Inside an AWS Private S3 bucket, a specific object can be made public by using any of the following steps: Update the object's access control list read more..

By: Contributor II
Custom Rules using Domain Specific Language

Build custom rules underPolicies > Security Assessmentusing Domain Specific Language (DSL) for Security Assessment of AWS, Azure, and Google Cloud read more..

By: Netskope
Ensure no security groups / firewall rules allow ingress from 0.0.0.0/0 to port [ ]

Security groups (AWS, Azure) and firewall rules provide stateful filtering of ingress/egress network traffic to Cloud Provider resources. The AWS rule read more..

In order to view this content, you will need to sign in to your account. Simply click the "Sign In" button below

Sign In