Ask the community
Security Posture Management
Filters:
By: Moderator
Getting started with Netskope Governance Language (NGL) with Azure AD

Netskope’s new graph-powered SaaS Security Posture Management (SSPM) engine can help security analysts investigate root causes and identify repeating read more..

By: Moderator
Automated remediation in Azure

In this article we show how to set up an automatic remediation workflow in Azure, leveraging the APIs available in Netskope’s Cloud Security Posture M read more..

By: Netskope
Ensure Azure Active Directory donot have any stale users ( users who did not login in last 30 days)

Azure has the following logic to check Active Directory for stale users: refreshTokensValidFromDateTime > STSTokenLifetimePolicy MaxInactiveTime (d read more..

By: Netskope
Ensure specific Azure Compute Instances do not have a public IP

Public IP addresses allow Internet resources to communicate inbound to Azure resources. Security posture Management can help with custom rules to ens read more..

By: Netskope
Ensure Public buckets donot have a PII tag. (AWS / Azure / GCP)

Organizations have their own convention of tagging buckets containing PII objects . We can leverage Security Posture Management to create custom rules read more..

By: Contributor II
Custom Rules using Domain Specific Language

Build custom rules underPolicies > Security Assessmentusing Domain Specific Language (DSL) for Security Assessment of AWS, Azure, and Google Cloud read more..

By: Netskope
Ensure no security groups / firewall rules allow ingress from 0.0.0.0/0 to port [ ]

Security groups (AWS, Azure) and firewall rules provide stateful filtering of ingress/egress network traffic to Cloud Provider resources. The AWS rule read more..

In order to view this content, you will need to sign in to your account. Simply click the "Sign In" button below

Sign In