S3 Permissions Auditing
Obtain detailed information and views on permissions assigned to AWS S3 Buckets, highlighting specific threats like “Open” Buckets and Broken Inheritance.
S3 Sensitive Data Discovery
Audit and analyze S3 Bucket content and object details, including the identification of sensitive information, ePHI, PII, and custom criteria like Employee IDs and trade secrets.
Root Account Security
Audit and analyze AWS root accounts for important security settings, including access keys and MFA configuration.
IAM User Security
Audit and analyze AWS IAM user accounts which have not rotated their access keys or have never used it, as well as the MFA status of each AWS user.
Identify user accounts which no have not logged into AWS for an extended amount of time or have never logged in.
Group Membership Analysis
Understand group memberships and obtain summarized views on the policies assigned to each group.
Stale Group Analysis
Identify group conditions that could indicate staleness such as Orphaned Groups and Empty Sensitive Security Groups, as well as Groups with Stale Membership.
Sensitive Security Groups
Track the membership of groups that have sensitive or higher-level security policies assigned to them for security and compliance.
Inventory IAM roles, along with associated details and configurations.
IAM Policy Analysis
Inventory and analyze all AWS policies (AWS and Custom Managed, and Inline), as well as Duplicate and Unused policies that can be consolidated or removed.