Overview

Cloud Security Posture Management (CSPM) is the process of securing multi-cloud environments through enhanced visibility, risk and misconfiguration identification, posture assessment, and compliance protocols. CodeAnt AI continuously monitor cloud infrastructure—such as Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS)—for gaps in security policy enforcement.

Key Features

  • Multi-Cloud Support: Currently supports AWS, with support for GCP and Azure coming soon.
  • Seamless Integration: Connect seamlessly with any cloud provider and continuously monitor for security vulnerabilities, misconfigurations, and compliance issues.

How It Works

  1. Permissions:
    • An IAM role is needed with the required AWS managed permission roles.
    • Read permission and a custom permission with following policy is required.
    • IAM Permissions
{
    "Version": "2012-10-17",
    "Statement": [
        {
            "Sid": "VisualEditor0",
            "Effect": "Allow",
            "Action": [
                "cloudformation:GetGeneratedTemplate",
                "cloudformation:CreateGeneratedTemplate",
                "cloudformation:StartResourceScan",
                "cloudformation:UpdateGeneratedTemplate",
                "cloudformation:DescribeResourceScan"
            ],
            "Resource": "*"
        }
    ]
}
  1. Settings:

    • Once you have the access key and secret key, navigate to Settings -> Cloud Security Settings.
    • Enter the credentials and save.
    • Credentials
  2. Start a Scan:

    • Go to Cloud Security -> Start a New Scan.
    • Within 15-20 minutes, the scan will be completed, and you will see the results.

Benefits

  • Enhanced Visibility: Gain complete visibility into your cloud infrastructure’s security posture.
  • Risk and Misconfiguration Identification: Continuously identify and address risks and misconfigurations.
  • Compliance Assurance: Ensure your cloud infrastructure complies with industry standards and protocols.

Demo

For a detailed use case and step-by-step guide on how to utilize the cloud security feature, check out our demo. The demo provides a comprehensive walkthrough, showing you how to configure settings, start a scan, and interpret the results effectively.