Real time alerts for suspicious activity and events on my cloud infrastructure
|Technical Team member|
|DevOps Team member|
|Security Team Management|
Step 3. Set up RTM.
Step 4. Set up communication channel(s) for example Slack, Jira, and SMS to receive RTM notifications about suspicious activity.
Step 5. Set communication triggers to send customised RTM notifications to your communication channels.
Step 6. Monitor RTM notifications within Cloud Conformity and your communication channels. Investigate suspicious activity and utilise Cloud Conformity’s failed check resolution workflow to remediate.