Skip to content
SecPod  – Documentation
  • Docs Home
  • Categories
    • Saner Platform
    • Saner Cloud
    • Saner CVEM
    • Security Intelligence
  • More
    • About SecPod
    • Blog
    • Security & Privacy
    • Support Center
    • Resources
  • SCHEDULE A DEMO
  • Toggle website search
Search this website
Menu Close
  • Docs Home
  • Categories
    • Saner Platform
    • Saner Cloud
    • Saner CVEM
    • Security Intelligence
  • More
    • About SecPod
    • Blog
    • Security & Privacy
    • Support Center
    • Resources
  • SCHEDULE A DEMO
  • Toggle website search
  • Docs Home
  • Categories
    • Saner Platform
    • Saner Cloud
    • Saner CVEM
    • Security Intelligence
  • More
    • About SecPod
    • Blog
    • Security & Privacy
    • Support Center
    • Resources
  • SCHEDULE A DEMO

Saner Platform

  • Saner Platform Release Notes
    • Saner Platform Integration Release: ServiceNow Integration Introduced, Freshservice Enhanced
    • Release Notes Saner 6.4.1
    • Release Notes SanerNow 6.4
    • Release Notes SanerNow 6.3.1
    • Release Notes SanerNow 6.3
    • Release Notes SanerNow 6.2.1
    • Release Notes SanerNow 6.2.0.3
    • Release Notes SanerNow 6.2.0.1
    • Release Notes SanerNow 6.2
    • Release Notes SanerNow 6.1.1
    • Release Notes SanerNow 6.1
    • Release Notes SanerNow 6.0
    • Release Notes SanerNow 5.3.1
    • Release Notes SanerNow 5.3
    • Release Notes SanerNow 5.2
    • Release Notes SanerNow 5.1
    • Release Notes SanerNow 5.0
    • Release Notes SanerNow 4.8.0.0
    • Release Notes SanerNow 4.7.0.0
    • Release Notes SanerNow 4.6.0.0
    • Release Notes SanerNow 4.5.0.0
    • Release Notes SanerNow 4.4.0.0
    • Release Notes SanerNow 4.3.0.0
    • Release Notes SanerNow 4.2.2.1
    • Release Notes SanerNow 4.2.2.0
    • Release Notes SanerNow 4.2.1.0
    • Release Notes SanerNow 4.2.0.0
    • Release Notes SanerNow 4.1.1.0
    • Release Notes SanerNow 4.0.0.5
  • Saner Platform Guide
    • Saner Administration Guide
    • Saner Device Management User Guide
    • Saner Platform and ServiceNow Integration Guide
    • Saner Platform and Freshservice Integration Guide
    • Saner Platform Function Guides
  • FAQs
    • Saner CVEM Technical FAQs
  • How Tos
    • General
      • How to increase the subscription count for an Account in Saner CVEM
      • How to increment license count for an Organization in Saner CVEM
      • How to provision Saner tools for an Organization
      • How to change subscription type in Saner CVEM
      • How to sign-up with Saner CVEM?
      • How to create a new account in Saner CVEM?
      • How to enable SSO authentication policy in Saner CVEM?
      • How to set alerts in Saner?
      • How to view, download and filter the audit logs?
      • How to designate Saner Agent to perform network scan?
      • How to Co-Brand with your logo?
      • How to fetch the details of the mandatory fields from the Okta account?
      • How to create MFA policy for Okta?
      • How to fetch the details of the mandatory fields from the PingID account?
      • How to create MFA policy for PingID?
      • How to fetch the details of the mandatory fields from the PingOne account?
      • How to create MFA policy for PingOne?
      • How to download and install Saner Agent in Mac?
      • How to download and install Saner agent in Linux?
      • How to download and install the Saner agent in Windows?
      • How to update the expiry date of an existing subscription?
      • How to manage users and their preferences using role-based access?
      • How to uninstall Saner Agent using Saner Offline deployer tool.
      • How to onboard a new organization?
      • How to deploy Saner Agent using Saner Offline deployer tool.
      • How to install a Saner agent through the command line?
      • How to uninstall the Saner agent through command line?
    • Saner Reports
      • How to configure mail settings to email Report PDF?
      • How to create a custom report in Saner?
      • How to schedule for the report back up?
    • Saner Device Management
      • How to create custom groups in Saner CVEM
    • Saner Mail Settings
      • How to create new mail settings in Saner?
      • How to use OAuth-enabled authentication in Saner mail settings
      • How to create OAuth Client ID and Client Secret for Gmail
      • How to create OAuth Client ID and Client Secret for Microsoft 365.
  • Supported OSs and Platforms
    • Operating Systems and Platforms Supported
    • Supported Third-party Applications for Patching

Saner Cloud

  • Before You Begin
    • Glossary of Terms
    • Read me First
  • Get Started
    • Prerequisites For Saner SaaS Platform Deployment
    • Saner Cloud Deployment Guides
      • GCP OAuth Scopes for Saner CNAPP
      • Onboarding a GCP Organization to Saner Cloud(CLI)
      • Onboarding a GCP Project to Saner Cloud (CLI)
      • Onboarding a GCP Organization to Saner Cloud(Manual)
      • Onboarding a GCP Project to Saner Cloud(Manual)
      • Azure Onboarding
      • Troubleshooting
      • Get Started with Saner CNAPP AWS Cloud Deployment V1.0
      • Onboarding with AWS Credentials(Least Recommended Method)
      • Onboarding with AWS Role(Manual)
      • Onboarding with AWS Role CloudFormation (Automatic): Recommended
    • Roles and Permissions
      • Roles and Permissions for AWS Remediation Access
      • Roles and Permissions for Azure Onboarding, Detection, and Remediation
  • Saner COSP User Guide
    • Container Orchestration Asset Exposure(COAE) User Guide
    • Container Orchestration Posture Management(COPM) User Guide
    • Container Orchestration Remediation Management(CORM) User Guide
    • Container Orchestration Entitlement Management(COEM) Userguide
    • Container Orchestration Security Platform (COSP) User Guide
    • Container Orchestration Posture Anomaly(COPA) Userguide
  • Learn About
    • Saner CNAPP Best Practices
    • Secure Your IAM entities with Cloud Infrastructure Entitlement Management (CIEM)
    • Critical Events to Monitor in GCP
    • Saner CSRP Classification Based on Scoring Decision
    • Cloud Cyber Hygiene Scoring(CCHS) Approach
    • Remediation Rollback
    • Automation and Job-driven Remediation
    • Cost and Usage
    • Excessive Permission Categories Evaluated Across Different Cloud Services
    • Publicly Accessible Resources
    • Patch Aging and Patch Impact
    • SecPod Default Benchmarks
    • Watchlists
    • Cloud Workload Protection Platform(CWPP)
    • Overview of Report Views in Saner Cloud
    • Whitelisting Resources
    • Saner Plasma AI Assistant for Seamless User Interaction
    • Critical Events to Monitor in AWS
    • High-Privilege Actions in Critical Activity Logs for AWS
    • Audit Logs in Saner Cloud
    • Excessive Permissions
    • Alerts in SanerCloud
  • Saner Cloud User Guides
    • GCP Cloud Infrastructure Entitlement Management (CIEM) User Guide
    • Azure Cloud Infrastructure Entitlement Management(CIEM) User Guide
    • Cloud Security Risk Prioritization(CSRP) User guide
    • Cloud Cyber Hygiene Score(CCHS) User Guide
    • Cloud Security Remediation Management(CSRM) User Guide
    • AWS Cloud Infrastructure Entitlement Management(CIEM) User Guide
    • Cloud Security Posture Anomaly(CSPA) User Guide
    • Cloud Security Asset Exposure(CSAE) User Guide
    • Cloud Security Posture Management(CSPM) User Guide
  • Tell Me How
    • How to Remediate in Saner Cloud?
    • How to Configure Automation Rule to Remediate Misconfigurations?
    • How to Manage Report Views at Organization-level in Saner Cloud?
    • How to Get a Cohesive View from Saner Cloud Unified Dashboard?
    • How to Use Tags to Quickly Filter Resources?
    • How to Troubleshoot Issues with Audit Logs?
    • How to Manage Groups and Tags in Saner Cloud?
    • How to Manage Report Views for a User Account in Saner Cloud?
    • How to Troubleshoot or Analyze with Critical Activity Logs?
    • How to Setup Alerts Across SanerCloud Tools?
    • How to Take Action on Alert Notifications from SanerCloud?
    • CSRP
      • How to Monitor and Analyze Audit Logs for Risk Prioritization?
      • How to Configure Risk Based Cloud Security Alerts?
      • How to Generate Reports and Visualizations?
      • How to Filter Risks by Tags for Targeted Analysis?
      • How to Manage Prioritized Risks at Account-level?
      • How to View the Detailed Breakdown of a Specific Cloud Cyber Security Standard (CCSS) Risk Finding?
      • How to Review and Prioritize Resources Based on Associated Risks?
      • How to Assess Risk Distribution on Essential Resources?
      • How to Assess and Prioritize Risks Across Resource Categories?
      • How to Identify the Risks Affecting Essential Resources?
      • How to Assess Full Versus Limited Technical Impact of Exploiting an Anomaly?
      • How to Review the Risk Factor Distribution Based on Automatable Reliability?
      • How to Get an Overview of Exploitable Risks?
      • How to Map Risks to MITRE ATT&CK for Threat-Informed Defense?
      • How to Configure Questionnaire and Assess Security Practices Across Core Domains for an Account?
    • CCHS
      • How to Monitor Resource Risk Trends for CHS?
      • How to Assess Resource Health through Severity Distribution?
      • How to Evaluate Service-Level Risks Using CHS Scores?
      • How to Analyze Cyber Hygiene Scores through Trend Chart?
      • How to Identify High-Risk Resources by Geo Location?
      • How to Get an Overview of Cyber Hygiene for Cloud Resources?
      • How to Review Organization-Level Cyber Hygiene Across Accounts?
      • How to Assess Risk Distribution for Different Cloud Providers?
      • How to Review Major Issues Contributing to the Drop of Cyber Hygiene Score at Account-Level?
      • How to Analyze Module-wise Risk through CHS Distribution?
      • How to View the Cyber Hygiene Score Distributed Across Cloud Environments?
      • How to Track Security Posture with Cyber Hygiene Score?
      • How to Configure Account Weightage?
    • CSAE
      • How to Setup Watchlist Configuration for a Resource?
      • How to Identify Outdated Resources for Cleanup?
      • How does Resource Categorization Work in Saner CSAE?
      • How to Identify Resources Exposed to External Network?
      • How to Understand the Resource Footprint Globally Across Various Regions?
      • How to Make Informed Decisions on Your Expenditure based on Resource Usage Graph?
    • CSPM
      • How to Setup Benchmarks in Saner CSPM?
      • How to Use Quick Evaluation Benchmarks?
      • How to Detect Patterns over a Period with Resource Trends?
      • How to Assess System Compliance and Security Posture?
    • CSPA
      • How to Initiate Patch Remediation from CSPA Dashboard?
      • How to Quickly Identify the Detected and Remediated Anomalies for an Account?
      • How to Prioritize Remediation or Fixes based on Confidence Levels?
      • How to Examine the Overall Anomaly Information for Specific Rules or Checks?
      • How to Search and Retrieve Anomaly Data?
      • How to Whitelist Rules or Resources in Cloud Security Scans?
    • CIEM
      • How to See the Active Version for an IAM Policy?
      • How to Address Critical Activities Using Evidence?
      • How to View by Type and Usage for any Identity in CIEM?
      • How to Get Visibility into Cloud Entitlements?
      • How to Use Evidence to Address Policies with Excessive Permission?
      • How to Know the Excessive Permissions on a Specific Service?
      • How to Visually See the Relationship between Identity, Entitlement, Policy, or Permission?
      • How to Determine if a Policy has Excessive Permission?
      • How to Initiate Remediation for Different Identities from CIEM?
    • CSRM
      • Rollback an Applied Remediation
      • How to Configure Automation Rule to Remediate Misconfigurations?
      • How to Create a Patching Task for Items Currently in “Approval Pending” State?
      • How to Evaluate Remediation Effort with Patching Impact Chart?
      • How to Prioritize and Address Older or High-Risk Anomalies with Patch Aging?
      • How to Monitor the Overall Status of the Remediation Job?
      • How do I Get to Know the Regions Impacted by a Specific Rule?
      • How to View the Severity of a Missing Patch Affected by a Rule?
      • How to Address Missing Patches Via Remediation Tasks?
      • How to Quickly Access the Necessary Tool for Remediation and Begin Patching Tasks?
  • Frequently Asked Questions
    • Saner Cloud Technical FAQs
  • Saner Cloud Release Notes
    • Saner Cloud – V.3.0.1.0 Release Notes
    • Saner Cloud – V.3.0.0.0 Release Notes
    • Saner Cloud – V.2.0.0.2 Release Notes
    • Saner Cloud – V.2.0.0.1 Release Notes
    • Saner Cloud – V.2.0.0.0 Release Notes
    • Saner Cloud – V.1.2.0.1 Release Notes
    • Saner Cloud – V.1.2.0.0 Release Notes
    • Saner Cloud – V.1.1.0.0 Release Notes
    • Saner Cloud – V.1.1 Release Notes
    • Saner Cloud – V.1.0 Release Notes
  • Saner COSP Release Notes
    • Saner COSP – V.1.0.0.0 Release Notes

Saner CVEM

  • Saner CVEM Release Notes
    • Release Notes Saner CVEM 6.6
    • Release Notes Saner 6.5
    • Saner Platform Integration Release: ServiceNow Integration Introduced, Freshservice Enhanced
    • Release Notes Saner 6.4.1
    • Release Notes SanerNow 6.4
    • Release Notes SanerNow 6.3.1
    • Release Notes SanerNow 6.3
    • Release Notes SanerNow 6.2.1
    • Release Notes SanerNow 6.2.0.3
    • Release Notes SanerNow 6.2.0.1
    • Release Notes SanerNow 6.2
    • Release Notes SanerNow 6.1.1
    • Release Notes SanerNow 6.1
    • SanerNow Risk Prioritization Launch
    • Release Notes SanerNow 6.0
    • Release Notes SanerNow 5.3.1
    • Release Notes SanerNow 5.3
    • Release Notes SanerNow 5.2
    • Release Notes SanerNow 5.1
    • Release Notes SanerNow 5.0
    • Release Notes SanerNow 4.8.0.0
    • Release Notes SanerNow 4.7.0.0
    • Release Notes SanerNow 4.6.0.0
    • Release Notes SanerNow 4.5.0.0
    • Release Notes SanerNow 4.4.0.0
    • Release Notes SanerNow 4.3.0.0
    • Release Notes SanerNow 4.2.2.1
    • Release Notes SanerNow 4.2.2.0
    • Release Notes SanerNow 4.2.1.0
    • Release Notes SanerNow 4.2.0.0
    • Release Notes SanerNow 4.1.1.0
    • Release Notes SanerNow 4.0.0.5
    • Saner CVEM
      • Release Notes Saner CVEM 6.6
  • Saner CVEM Guide
    • Prerequisites For Saner SaaS Platform Deployment
    • What’s New in Saner CVEM?
    • Getting Started with Saner CVEM
    • Pre-requisites for Saner CVEM Deployment
    • How does Saner CVEM’s deployment architecture work?
  • Saner CVEM Products
    • Overview of Saner Continuous Vulnerability and Exposure Management
    • Saner CVEM Unified Dashboard User Guide
    • Saner CVEM Asset Exposure User Guide
    • Saner CVEM Continuous Posture Anomaly Management User Guide
    • Data Points IT teams can Fetch from Saner CPAM
    • Posture Anomaly Computation Rules
    • Saner CVEM Vulnerability Management User Guide
    • Saner CVEM Compliance Management User Guide
    • Saner CVEM Risk Prioritization User Guide
    • Saner CVEM Patch Management User Guide
    • Saner CVEM Endpoint Management User Guide
    • Saner CVEM Remote Scripting User Guide
    • Saner CVEM Remote Access User Guide
    • Saner CVEM Network Scanner User Guide
    • Saner CVEM Cyber Hygiene Score User Guide
  • How Tos
    • Saner AE
      • How to blacklist and whitelist applications in Saner AE?
      • How to manage asset licenses using Saner AE?
      • How to run an asset scan using Saner AE?
    • Saner CPAM
      • How to create new response in PA tool?
      • How to build your own detection and response in PA tool?
      • How to whitelist an entire PA ID?
      • How to configure Posture Anomaly tool for custom detection?
      • How to fix Anomalies from PA dashboard?
      • How to fix anomalies detected in your account from All Anomalies Page?
      • How to fix anomalies from PA Summary page?
      • How to delete PA scan preferences?
      • How to schedule PA Scans on Daily, Weekly, and Monthly basis?
      • How to launch Posture Anomaly scans?
    • Saner VM
      • How to automate and schedule vulnerability scans?
      • How to exclude vulnerabilities in Saner VM tool
      • How to manage excluded vulnerabilities in Saner VM?
      • How to remediate vulnerabilities from vulnerability management dashboard?
    • Saner CM
      • How to run a compliance scan?
      • How to custom create a security policy?
      • How to align with PCI security compliance management?
      • How to align with NIST 800-171 security compliance management?
      • How to align with NIST 800-53 security compliance management?
      • How to align with HIPAA security compliance management using Saner CM?
    • Saner PM
      • How to fix firmware in Saner?
      • How to exclude patches in Saner PM?
      • How to manage excluded patches in Saner PM?
      • How to automate patch management in Saner PM?
      • How to roll back patches in Saner PM?
      • How to apply missing patches in Saner PM?
      • How to apply the most critical patches in Saner PM?
      • How to perform custom remediation for applications that require paid patches using Saner PM
      • How to check the status of patching activity?
    • Saner EM
      • How to collect all security events from Windows Events Log?
      • How to check password policy set in Windows systems?
      • How to check status of DEP in Windows systems?
      • How to check faulty Anti-Virus (AV) status in Windows systems?
      • How to check for Anti-Virus (AV) status in Windows systems?
      • How to check account lockout policy on Windows systems?
      • How to check if Bit-locker protection is OFF in Windows systems?
      • How to list all inactive users on Windows systems?
      • How to list all guest accounts in Windows systems?
      • How to list all Administrator accounts on Windows systems?
      • How to list last-logon details of users on Windows systems?
      • How to identify all users in Windows systems?
      • How to collect all services that are currently running in Windows systems?
      • How to list all Groups in Windows systems?
      • How to collect all keyboard and pointing devices connected to Windows systems?
      • How to collect all storage devices connected to Windows systems?
      • How to investigate total RAM or CPU threshold (greater than or equal to 80%) in Windows systems?
      • How to collect operating systems information in Windows?
      • How to investigate disks running out of space (<100 MB) in Windows systems?
      • How to collect and investigate disk information on Windows systems?
      • How to collect all installed patches in Windows systems?
      • How to collect all software patches that are hidden in the Windows Update server?
      • How to check the status of Windows Update Server (WSUS/SCCM)?
      • How to collect BIOS information such as serial number, version, manufacturer in Windows systems?
      • How to collect all the important missing patches in Windows systems?
      • How to check wireless security in Linux systems?
      • How to collect mounted disk information on Linux systems?
      • How to check wireless signal quality in Linux systems?
      • How to check all firewall policies on Linux systems?
      • How to collect all Dynamic Host Configuration Protocol (DHCP) information on Linux systems?
      • How to collect DNS information on Linux systems?
      • How to collect ARP entries that are created when a hostname is resolved to an IP address and then to a MAC addressing in Linux?
      • How to check wireless signal quality in Windows systems?
      • How to check wireless security in Windows systems?
      • How to collect all open ports in Windows systems?
      • How to collect all network interfaces in Windows systems?
      • How to investigate DNS cache on Windows systems?
      • How to check all firewall policies on Windows systems?
      • How to collect DNS information on Windows systems?
      • How to collect all the applications with an unknown publisher in Linux systems?
      • How to perform system tuning?
      • How to collect all software licenses in Windows systems?
      • How to identify potentially unwanted programs such as torrent downloaders or unnecessary toolbars running on Windows systems?
      • How to collect a list of applications that are started when you boot your computer?
      • How to collect all the applications with an unknown publisher in Windows systems?
      • How to collect all software licenses in Mac systems?
      • How to collect ARP entries that are created when a hostname is resolved to an IP address and then to a MAC addressing Windows?
      • How to collect all families of operating systems such as Windows, Unix, and macOS?
      • How to collect environment variables set in all operating systems?
      • How to collect all the applications with an unknown publisher in Mac systems?
      • How to delete and quarantine a file?
      • How to start and stop the processes in Saner?
      • How to block blacklisted applications in Saner?
      • How to enable/disable devices in Saner
      • How to manually import devices into Saner?
      • How to deploy software in Saner EM?
      • How to enable and disable firewall settings in Saner AE?
      • How to collect all shared resources on Windows systems?
      • How to collect all Dynamic Host Configuration Protocol (DHCP) information on Windows systems?
      • How to connect to a client machine graphically using Saner Remote Access
  • FAQs
    • Saner CVEM Technical FAQs

Security Intelligence for Saner CVEM

  • Overview of Security Content and Intelligence
  • Security Content Statistics
  • OVAL Definitions Platform Coverage
  • OVAL Definitions Class-wise Distribution
  • OVAL Definitions Family-wise Distribution
  • Application and OS Remediation Coverage
  • Compliance Benchmark Coverage
  • List of Vulnerability to Exploit/Malware Mapping covered in Saner
  • Network Scanner Product Support Matrix
  • Privilege levels for authenticated scans using Saner Network Scanner

Security Intelligence for Saner Cloud

  • Benchmark Compliance Rules in AWS, Azure, and GCP
    • GCP
      • SecPod Rules in GCP
        • SecPod Default Rules in GCP: An Overview
        • Understand SecPod Default Rules in GCP
        • Understand SecPod Global Rules in GCP
        • Understand SecPod Regional Rules in GCP
      • CIS Rules in GCP
        • CIS Benchmark Compliance Rules in GCP: An Overview
        • Understand CIS 4.0.0 Rules in GCP
        • Understand CIS 4.0.0 Global Rules in GCP
        • Understand CIS 4.0.0 Regional Rules in GCP
    • AWS
      • SecPod Rules in AWS
        • SecPod Default Rules in AWS: An Overview
        • Understand SecPod Default Rules in AWS
        • Understand SecPod Global Rules in AWS
        • Understand SecPod Regional Rules in AWS
      • PCI DSS 3.2.1 Rules in AWS
        • PCI DSS 3.2.1 Rules in AWS: An Overview
        • Understand PCI DSS 3.2.1 Rules in AWS
        • Understand PCI DSS 3.2.1 Global Rules in AWS
        • Understand PCI DSS 3.2. 1 Regional in AWS
      • CIS Rules in AWS
        • CIS Rules in AWS: An Overview
        • Understand CIS Rules in AWS
        • Understand CIS 3.0.0 Rules in AWS
        • Understand CIS 4.0.1 Rules in AWS
        • Understand CIS 4.0.0 Rules in AWS
        • Understand CIS 3.0.0 Global Rules in AWS
        • Understand CIS 4.0.0 Global Rules in AWS
        • Understand CIS 3.0.0 Regional Rules in AWS
        • Understand CIS 4.0.0 Regional Rules in AWS
      • SOC 2 Rules in AWS
        • SOC 2 Rules in AWS: An Overview
        • Understand SOC 2 Rules in AWS
        • Understand SOC 2 Global Rules in AWS
        • Understand SOC 2 Regional Rules in AWS
      • HIPAA HITRUST Rules in AWS
        • HIPAA HITRUST Rules in AWS: An Overview
        • Understand HIPAA HITRUST Rules in AWS
        • Understand HIPAA HITRUST Global Rules in AWS
        • Understand HIPAA HITRRUST Regional Rules in AWS
      • NIST 800-53 Revision 5 Rules in AWS
        • NIST 800-53 Revision 5 Rules in AWS: An Overview
        • Understand NIST 800-53 Revision 5 Rules in AWS
        • Understand NIST 800-53 Revision 5 Global Rules in AWS
        • Understand NIST 800-53 Revision 5 Regional Rules in AWS
    • Azure
      • CIS Rules in Azure
        • CIS Rules in Azure: An Overview
        • Understand CIS 1.2.0 Rules in Azure
        • Understand CIS 2.1.0 Rules in Azure
        • Understand CIS 1.1.0 Benchmark Compliance Rules in Azure
        • Understand CIS 3.0.0 Benchmark Compliance Rules in Azure
        • Understand CIS 1.2.0 Global Benchmark Compliance Rules in Azure
        • Understand CIS 2.1.0 Global Benchmark Compliance Rules in Azure
        • Understand CIS 3.0.0 Global Benchmark Compliance Rules in Azure
        • Understand CIS 2.1.0 Regional Benchmark Compliance Rules in Azure
        • Understand CIS 3.0.0 Regional Benchmark Compliance Rules in Azure
      • NIST 800-53 Revision Rules in Azure
        • NIST 800-53 Revision 5 Rules in Azure: An Overview
        • Understand NIST 800-53 Revision 5 Rules in Azure
        • Understand NIST 800-53 Revision 5 Global Rules in Azure
        • Understand NIST 800-53 Revision 5 Regional Rules in Azure
      • SecPod Rules in Azure
        • SecPod Default Rules in Azure: An Overview
        • Understand SecPod Global Rules in Azure
        • Understand SecPod Regional Rules in Azure
        • Understand SecPod Default Rules in Azure
      • HIPAA HITRUST Rules in Azure
        • HIPAA HITRUST Rules in Azure: An Overview
        • Understand HIPAA HITRUST 14.7.0 Rules in Azure
        • Understand HIPAA HITRUST 14.7.0 Global Rules in Azure
        • Understand HIPAA HITRUST 14.7.0 Regional Rules in Azure
      • PCI DSS Rules in Azure
        • PCI DSS 3.2.1 Rules in Azure: An Overview
        • Understand PCI DSS 4.0 Rules in Azure
        • Understand PCI DSS 4.0 Global Rules in Azure
        • Understand PCI DSS 4.0 Regional Rules in Azure
      • SOC 2 Rules in Azure
        • SOC 2 Rules in Azure: An Overview
        • Understand SOC2 Rules in Azure
        • Understand SOC2 Global Rules in Azure
        • Understand SOC2 Regional Rules in Azure
  • Posture Anomaly Checks in AWS and Azure
    • Implementing Posture Anomaly Checks in AWS
    • Implementing Posture Anomaly Checks in Azure
  • Infrastructure Entitlement Checks in AWS, Azure, and GCP
    • Implementing Infrastructure Entitlement Checks in AWS
    • Implementing Infrastructure Entitlement Checks in Azure
    • Implementing Infrastructure Entitlement Checks in GCP
View Categories
  • Home
  • Docs
  • Saner Cloud
  • Saner COSP User Guide
  • Container Orchestration Posture Management(COPM) User Guide

Container Orchestration Posture Management(COPM) User Guide

Print Friendly, PDF & Email

The Saner Container Orchestration Posture Management(COPM) tool provides a comprehensive framework to assess, monitor, and enhance the security posture of your cloud environments. It combines powerful dashboard analytics with flexible benchmark management capabilities to ensure continuous compliance and visibility into security risks.

Through interactive dashboard views, you can analyze findings by severity, evaluate overall compliance status, and track security issue trends over time. The dashboard also helps you to analyze issues by namespace, view all security findings in detail, monitor compliance overviews for primary benchmarks, and assess affected resources by resource type, helping you quickly identify and prioritize remediation actions. In addition, you can create and manage benchmarks to define your container security standards.

On the whole, Saner Container Orchestration Posture Management provides end-to-end orchestration, monitoring, and improving cloud security and compliance across your environments.

Get Started

This guide walks you through every stage of using COPM, from initial setup to advanced monitoring. You’ll learn how to manage container orchestration security benchmarks, run scans, analyze findings, evaluate overall compliance status, analyze issues by namespace, and more.

By the end of this guide, you would have tapped into COPM’s full capabilities for intelligent, data-driven management of your Kubernetes and cloud ecosystems.

Access the Container Orchestration Posture Management (COPM) Dashboard or directly via the App Launcher.

You can access the COPM Dashboard through 2 entry points: the overall COSP Dashboard or directly via the App Launcher.  

EntryPoint 1: From the Overall COSP Dashboard

EntryPoint 2: From the App Launcher

Manage Container Orchestration Security Benchmarks

Create a Benchmark

Creating a benchmark involves a straightforward 3-step process: selecting a template, choosing the security rules to include in the custom benchmark, and configuring benchmark settings, such as the name, description, and target namespace.

Once you have created a benchmark, you can view all configured benchmarks, run scans to assess compliance, and analyze detailed results. The module also provides the option to modify existing benchmarks or delete those that are no longer necessary, ensuring effective and continuous management of your container security posture.

Step1: Choose Template

To begin the benchmark creation process, you must first select an appropriate template that outlines the baseline configuration and set of controls for evaluation.

The available templates are:

Default Benchmark

This is a comprehensive benchmark that combines rules that evaluate both namespaced resources and cluster-wide resources for a complete assessment of container orchestration security, for example, Kubernetes security, and compliance.

SecPod Namespace Scoped Benchmark

This template focuses on evaluating namespace-level configurations, policies, workloads, and access controls within individual namespaces.

SecPod Cluster Scoped Benchmark

This benchmark is designed to assess cluster-wide components, including control plane configurations, node security, and global access policies.

CIS Kubernetes Benchmark v1.11.1

Developed based on the Center for Internet Security’s (CIS) industry-recognized standards, this benchmark is aimed at securing Kubernetes environments.

Choosing the right template is crucial as it ensures that the benchmark aligns with your security objectives and provides an appropriate scope for compliance assessment.

Here’s a look at each compliance benchmark template in detail:

SecPod Default Benchmark

SecPod Default Benchmark provides comprehensive security and compliance framework by integrating rules that evaluate both namespace resources and cluster-scoped resources.

Namespace-scoped rules focus on configurations and resources within individual namespaces, such as pods, deployments, and network policies, ensuring security at the application or team level. On the other hand, Cluster-scoped rules address global configurations that affect the entire Kubernetes cluster, including API server settings, etcd configurations, and components of the control plane.

By combining these two scopes, SecPod Default Benchmark offers a thorough assessment that helps identify misconfigurations from security standards, and maintain overall compliance within the cluster.

SecPod Namespace Scoped Benchmark

The SecPod Namespace Scoped Benchmark focuses on evaluating the security and compliance aspects within individual namespaces, providing a more detailed and application-centric perspective on cluster security. It examines configurations related to workloads such as pods, deployments, daemon sets, network policies, and role-based access controls (RBAC) that dictate permissions within each namespace.

This benchmark helps ensure that each namespace operates securely and independently, in the process minimizing risks such as privilege escalation, cross-namespace access, and unauthorized communication between workloads. By concentrating on namespace-level configurations, it allows teams to maintain consistent security baselines, enforce least-privilege access, and effectively support multi-tenant or segmented environments.

SecPod Cluster Scoped Benchmark

The SecPod Cluster Scoped Benchmark focuses on evaluating the security and compliance at the cluster-wide level. It ensures that the foundational components and configurations of the cluster are properly secured. This benchmark assesses key control plane elements, such as the API server, controller manager, scheduler, and etcd, to verify that they are configured according to best practices.

Additionally, it reviews security settings at the node level, including kubelet configurations and operating system hardening, to protect the infrastructure that hosts workloads. The benchmark also examines global access policies, authentication mechanisms, and audit logging to ensure that administrative operations and user interactions across the cluster are secure and traceable.

By addressing these comprehensive, system-wide controls, the SecPod Cluster Scoped Benchmark helps maintain consistent compliance, safeguard the overall integrity of the cluster, and reduce the risk of misconfigurations that could impact multiple namespaces or workloads.

CIS Kubernetes Benchmark v1.11.1

CIS Kubernetes Benchmarks present an essential framework for effectively securing Kubernetes clusters. These benchmarks provide comprehensive security guidance across several key areas, including securing the master node that manages the cluster, hardening worker nodes that run containerized applications, and implementing best practices for pod security to ensure a safe application environment.

By following these benchmarks, organizations can improve the security and integrity of their Kubernetes deployments, reduce risks, and ensure that their infrastructure remains robust, secure, and compliant with industry best practices.

Saner Container Orchestration Posture Management(COPM) provides you with the option to choose CIS Kubernetes v1.11.1 adopting the compliance template. Note that selecting this template is optional.

In this example, CIS Kubernetes Benchmark v1.11.1 contains around 134 rules to secure Kubernetes clusters and workloads.

Step2: Select Rules

In the second step of benchmark creation, select the security rules to include in your custom benchmark from the list of benchmarks and rules. To do this, click the checkbox under the “Finding” column for each desired rule.

You can also view additional details, including the Rule ID, Severity, and Benchmark Type associated with each finding.

If necessary, you can update the severity level (Critical, High, Medium, or Low) by clicking the “Edit” button and selecting the appropriate level.

Additionally, review the Rule Type assigned to each benchmark:

  • Manual Rules require human verification, such as checking physical security policies or manually reviewing configurations
  • Automated Rules can be validated programmatically using scripts or security tools; for example, you can verify whether disk encryption is enabled through automated scans

You can also search for a specific rule by entering the keyword in the Search box.

Step3: Configure Settings

In this step, configure the benchmark settings to define how the compliance assessment gets executed.

Set the deployment preferences(name and description), namespace targeting, and benchmark type as required.

Enter the mandatory details as follows:

  1. Provide a unique and descriptive name for the benchmark
  2. Add a brief summary explaining the purpose of the benchmark
  3. Specify the namespaces to which the benchmark applies in the Namespace Targeting field. Click the Select All checkbox if you want to include all the namespaces in the benchmark.
  4. Choose one of the benchmark type options:
    1. Primary Benchmark: The main compliance standard for the cluster
    1. Quick Evaluation Benchmark: A supplementary compliance check. The results will be available in the detailed reports.
  5. After filling in all the required information, click Create Benchmark to complete the setup

View All the Configured Benchmarks

From the Benchmark Configuration list, you have an option to view all the configured benchmarks, update rules, run scan, and delete the benchmark as needed.

Just click the appropriate button and perform the requisite action.

Run Scans

Click the Scan button on the Benchmark Configuration details page and completed, the severity of the benchmark displays as applicable.

View Details

Clicking the button redirects you to the All Findings page, allowing you to view the detailed issue information and proceed with the required patch remediation tasks.

Modify the Benchmark

From the Benchmark Configuration details page, click the Update button corresponding to a benchmark and proceed to modify the Benchmark Rules.

Delete the Benchmark

From the Benchmark Configuration details page, click the Delete button corresponding to a Primary or Quick Evaluation Benchmark.

Analyze Findings by Severity

The Findings based on Severity chart visually represents the total number of detected issues, categorized by Critical, High, Medium, and Low severity levels.

The pie chart allows users to quickly assess the distribution of issues based on their risk impact. By moving your cursor over the chart, users can view the exact count of issues within that category, providing greater insight into the overall security posture.

Additionally, users have the option to export the data to a CSV file for further analysis.

Clicking on the chart redirects you to the All Findings page, allowing you to view the detailed issue information and proceed with the required patch remediation tasks.

Evaluate Overall Compliance Status

The Compliance Status dashboard presents a horizontal bar chart view of compliance results for all evaluated resources. It shows the count and percentage of items categorized as Passed, Failed, or Deselected, allowing you to assess the overall adherence to compliance standards.

This visualization helps identify areas that meet compliance requirements and highlights those that need immediate attention or further review.

Clicking on the chart redirects you to the All Findings page, allowing you to view the detailed issue information and proceed with the required patch remediation tasks.

Analyze Issues by Namespace

A Namespace in Kubernetes is a logical partition within a cluster used to group and isolate resources. It can include multiple components such as pods, deployments, services, and configurations, typically organized by application, environment (such as development, testing, or production), or team.

On the other hand, Issues represent security findings, compliance violations, or configuration errors detected within these resources, such as misconfigured network policies, insecure container images, overly permissive access policies, and non-compliance with CIS or organizational benchmarks.

Saner Cloud Orchestration Posture Management(COPM) provides a bar chart view of Namespace versus Count of Issues, where the x-axis represents namespaces and the y-axis represents the total count of issues. Clicking on any bar redirects you to the All Findings page, allowing you to view the detailed issue information and proceed with the required patch remediation tasks.

View and Analyze All Security Findings

The All Findings page presents a comprehensive and filterable table of Kubernetes security and compliance findings. It displays which resources and namespaces are affected, the severity of the issues, and if automated fixes are available.

From the top bar, you can filter findings by the following statuses: Passed, Failed, or Deselected. You can easily locate findings using the search box or download the results as a CSV file for further analysis. Additionally, you can adjust the number of findings displayed per page using a drop-down menu (for example, 15 records per page).

This page lists security findings detected during a compliance scan, with each row representing a rule or control evaluated against cluster or namespace resources.

Here’s a brief overview of what each column represents:

Rule ID

A unique identifier for each compliance rule (e.g., COSP-K8S-2025-0018).

Title

Describes the specific issue or security misconfiguration (for example, Automatic Mounting of Service Account Token).

Description

Provides a brief summary of the issue.

Benchmark Name

Indicates the benchmark or policy set that defined the rule (for example, SecPod Default, COSP-K8S-2025-0001).

Affected Resources Count

The number of resources impacted by the issue.

Namespaces

Lists the Kubernetes namespaces where the affected resources are located (for example, default, kube-node-lease). You can view and select the appropriate namespace by clicking the + symbol next to the Namespace value.

Affected Resource Type

The type of Kubernetes object impacted (for example, ConfigMap, DaemonSet).

Severity

 The risk level (Low, Medium, or High) assigned to the finding, accompanied by color coding for quick visibility.

Fix

Displays a wrench icon if a remediation or fix is available. Click to read more on how to initiate patch remediation.

Monitor Compliance Overview for Primary Benchmarks

The “All Primary Benchmarks” chart displays a summary of compliance performance for benchmarks that have been marked as Primary during configuration. This dashboard view allows security teams to compare compliance performance, identify benchmarks with lower adherence, prioritize remediation based on severity and failures, and continuously monitor alignment with standards like CIS or NIST.

The chart presents an overview of primary benchmark configurations, detailing the configuration name, description, benchmark name, severity, compliance statistics, and compliance percentage.

The severity column categorizes findings by risk level, high, medium, or low, with color-coding for quick identification.

Compliance statistics indicate the number of controls that have passed, failed, or remain unchecked, while the compliance percentage provides a quick view of how closely each benchmark aligns with security standards.

For example, benchmarks with an 80% compliance rate show that 80% of controls have passed, and 20% either failed or were not evaluated.

Clicking on the Configuration Name link redirects you to the All Findings page, allowing you to view the detailed benchmark information and proceed with the required patch remediation tasks.

Analyze Affected Resources by Service Type

The Findings based on Resource Types chart uses a heat map to illustrate the distribution of affected resources across various service types. Each block in the chart represents a specific service category, with its size and shading reflecting the relative number of affected resources.

Move your cursor over the chart to see the count of resources within a specific service category. For example, the service type Pod may include 167 affected resources.

This visualization helps identify which service categories contribute most to the organization’s overall risk exposure, allowing teams to prioritize remediation efforts more effectively across different resource types. Additionally, you also have an option to export the data into CSV(available on top-right of the block) for further analysis.

Clicking on the chart redirects you to the All Findings page, allowing you to view the detailed issue information and proceed with the required patch remediation tasks.

Track Security Issue Trends by Severity Over Time

The Issue Trend Based on Severity chart provides a visual assessment of how well misconfigurations get managed over time, if issues get fixed, persists, or increases in number.

Th chart represents the classification of security findings as Critical, High, Medium, and Low, and how it changes over time following the most recent scan.

For example, the trend indicates that identified issues have not significantly reduced, implying limited remediation activity or recurring issues. This helps teams monitor remediation effectiveness, detect persistent risks, and prioritize actions for high-severity issues.

By hovering over any data point, you see the latest count of issues for each severity category on that specific date.

This trend analysis is crucial for tracking the progress of remediation, identifying recurring issues, and evaluating the effectiveness of security measures over time.

Additionally, you also have an option to export the data into CSV(available on top-right of the block) for further analysis.

Share This Article :

  • X
  • LinkedIn
Still stuck? How can we help?

Saner Documentation Feedback

Container Orchestration Asset Exposure(COAE) User GuideContainer Orchestration Remediation Management(CORM) User Guide
Table of Contents
  • Get Started
    • Access the Container Orchestration Posture Management (COPM) Dashboard or directly via the App Launcher.
      • EntryPoint 1: From the Overall COSP Dashboard
      • EntryPoint 2: From the App Launcher
  • Manage Container Orchestration Security Benchmarks
    • Create a Benchmark
      • Step1: Choose Template
        • SecPod Default Benchmark
        • SecPod Namespace Scoped Benchmark
        • SecPod Cluster Scoped Benchmark
        • CIS Kubernetes Benchmark v1.11.1
      • Step2: Select Rules
      • Step3: Configure Settings
    • View All the Configured Benchmarks
    • Run Scans
    • View Details
    • Modify the Benchmark
    • Delete the Benchmark
  • Analyze Findings by Severity
  • Evaluate Overall Compliance Status
  • Analyze Issues by Namespace
  • View and Analyze All Security Findings
  • Monitor Compliance Overview for Primary Benchmarks
  • Analyze Affected Resources by Service Type
  • Track Security Issue Trends by Severity Over Time
Copyright 2026 - SecPod. All Rights Reserved. Privacy Policy.
SanerNow Version 6.5.x