Open menu
-->

Cloud Conformity Real-Time Threat Monitoring

Cloud Conformity Real-Time Threat Monitoring check list



List of Real-Time threat monitoring checks:

Cloud Conformity User Signed In From Non-Approved Country
Cloud Conformity user authentication from a non-approved country has been detected.

Cloud Conformity User Has Signed In Without MFA
Cloud Conformity user authentication without MFA has been detected.

Detect AWS Networking Configuration Changes
Networking configuration changes have been detected within your Amazon Web Services account.

Privileged AWS IAM User Has Been Created
Creation of privileged AWS Identity and Access Management (IAM) user has been detected.

AWS Root User Has Signed In
Amazon Web Services account authentication using root credentials has been detected.

AWS Root User Has Signed In Without MFA
Cloud Conformity user authentication without MFA has been detected.

Monitor Unintended AWS API Calls
Unintended AWS API calls have been detected within your Amazon Web Services account.

IAM User Failed Signing in to the AWS Console
Monitor AWS IAM user's failed signing attempts.

AWS IAM User Has Signed In Without MFA
Amazon Web Services IAM user authentication without MFA has been detected.

Detect IAM User Sign-In Requests Outside Regular Business Hours
AWS Management Console sign-in requests for IAM users have been detected outside regular business hours.

AWS User Signed In From Non-Approved Country
Amazon Web Services root/IAM user authentication from a non-approved country has been detected.

AWS User Signed In From Blacklisted IP Address
Amazon Web Services root/IAM user authentication from a blacklisted IP address has been detected.

AWS Activity Detected Within Blacklisted Region(s)
AWS User/API activity has been detected within blacklisted Amazon Web Services region(s).