CSPM Auto remediation for GCP
In this article we’ll demonstrate how you can implement automatic remediation for security posture violation findings discovered by Netskope Cloud Sec read more..
Ensure Public buckets donot have a PII tag. (AWS / Azure / GCP)
Organizations have their own convention of tagging buckets containing PII objects . We can leverage Security Posture Management to create custom rules read more..
Custom Rules using Domain Specific Language
Build custom rules underPolicies > Security Assessmentusing Domain Specific Language (DSL) for Security Assessment of AWS, Azure, and Google Cloud read more..
Ensure no security groups / firewall rules allow ingress from 0.0.0.0/0 to port [ ]
Security groups (AWS, Azure) and firewall rules provide stateful filtering of ingress/egress network traffic to Cloud Provider resources. The AWS rule read more..