Skip to content
SecPod  – Documentation
  • Docs Home
  • Categories
    • Saner Platform
    • Saner Cloud
    • Saner CVEM
    • Security Intelligence
  • More
    • About SecPod
    • Blog
    • Security & Privacy
    • Support Center
    • Resources
  • SCHEDULE A DEMO
  • Toggle website search
Search this website
Menu Close
  • Docs Home
  • Categories
    • Saner Platform
    • Saner Cloud
    • Saner CVEM
    • Security Intelligence
  • More
    • About SecPod
    • Blog
    • Security & Privacy
    • Support Center
    • Resources
  • SCHEDULE A DEMO
  • Toggle website search
  • Docs Home
  • Categories
    • Saner Platform
    • Saner Cloud
    • Saner CVEM
    • Security Intelligence
  • More
    • About SecPod
    • Blog
    • Security & Privacy
    • Support Center
    • Resources
  • SCHEDULE A DEMO

Saner Platform

  • Saner Platform Release Notes
    • Saner Platform Integration Release: ServiceNow Integration Introduced, Freshservice Enhanced
    • Release Notes Saner 6.4.1
    • Release Notes SanerNow 6.4
    • Release Notes SanerNow 6.3.1
    • Release Notes SanerNow 6.3
    • Release Notes SanerNow 6.2.1
    • Release Notes SanerNow 6.2.0.3
    • Release Notes SanerNow 6.2.0.1
    • Release Notes SanerNow 6.2
    • Release Notes SanerNow 6.1.1
    • Release Notes SanerNow 6.1
    • Release Notes SanerNow 6.0
    • Release Notes SanerNow 5.3.1
    • Release Notes SanerNow 5.3
    • Release Notes SanerNow 5.2
    • Release Notes SanerNow 5.1
    • Release Notes SanerNow 5.0
    • Release Notes SanerNow 4.8.0.0
    • Release Notes SanerNow 4.7.0.0
    • Release Notes SanerNow 4.6.0.0
    • Release Notes SanerNow 4.5.0.0
    • Release Notes SanerNow 4.4.0.0
    • Release Notes SanerNow 4.3.0.0
    • Release Notes SanerNow 4.2.2.1
    • Release Notes SanerNow 4.2.2.0
    • Release Notes SanerNow 4.2.1.0
    • Release Notes SanerNow 4.2.0.0
    • Release Notes SanerNow 4.1.1.0
    • Release Notes SanerNow 4.0.0.5
  • Saner Platform Guide
    • Saner Administration Guide
    • Saner Device Management User Guide
    • Saner Platform and ServiceNow Integration Guide
    • Saner Platform and Freshservice Integration Guide
    • Saner Platform Function Guides
  • FAQs
    • Saner CVEM Technical FAQs
  • How Tos
    • General
      • How to increase the subscription count for an Account in Saner CVEM
      • How to increment license count for an Organization in Saner CVEM
      • How to provision Saner tools for an Organization
      • How to change subscription type in Saner CVEM
      • How to sign-up with Saner CVEM?
      • How to create a new account in Saner CVEM?
      • How to enable SSO authentication policy in Saner CVEM?
      • How to set alerts in Saner?
      • How to view, download and filter the audit logs?
      • How to designate Saner Agent to perform network scan?
      • How to Co-Brand with your logo?
      • How to fetch the details of the mandatory fields from the Okta account?
      • How to create MFA policy for Okta?
      • How to fetch the details of the mandatory fields from the PingID account?
      • How to create MFA policy for PingID?
      • How to fetch the details of the mandatory fields from the PingOne account?
      • How to create MFA policy for PingOne?
      • How to download and install Saner Agent in Mac?
      • How to download and install Saner agent in Linux?
      • How to download and install the Saner agent in Windows?
      • How to update the expiry date of an existing subscription?
      • How to manage users and their preferences using role-based access?
      • How to uninstall Saner Agent using Saner Offline deployer tool.
      • How to onboard a new organization?
      • How to deploy Saner Agent using Saner Offline deployer tool.
      • How to install a Saner agent through the command line?
      • How to uninstall the Saner agent through command line?
    • Saner Reports
      • How to configure mail settings to email Report PDF?
      • How to create a custom report in Saner?
      • How to schedule for the report back up?
    • Saner Device Management
      • How to create custom groups in Saner CVEM
    • Saner Mail Settings
      • How to create new mail settings in Saner?
      • How to use OAuth-enabled authentication in Saner mail settings
      • How to create OAuth Client ID and Client Secret for Gmail
      • How to create OAuth Client ID and Client Secret for Microsoft 365.
  • Supported OSs and Platforms
    • Operating Systems and Platforms Supported
    • Supported Third-party Applications for Patching

Saner Cloud

  • Before You Begin
    • Glossary of Terms
    • Read me First
  • Get Started
    • Prerequisites For Saner SaaS Platform Deployment
    • Saner Cloud Deployment Guides
      • GCP OAuth Scopes for Saner CNAPP
      • Onboarding a GCP Organization to Saner Cloud(CLI)
      • Onboarding a GCP Project to Saner Cloud (CLI)
      • Onboarding a GCP Organization to Saner Cloud(Manual)
      • Onboarding a GCP Project to Saner Cloud(Manual)
      • Azure Onboarding
      • Troubleshooting
      • Get Started with Saner CNAPP AWS Cloud Deployment V1.0
      • Onboarding with AWS Credentials(Least Recommended Method)
      • Onboarding with AWS Role(Manual)
      • Onboarding with AWS Role CloudFormation (Automatic): Recommended
    • Roles and Permissions
      • Roles and Permissions for AWS Remediation Access
      • Roles and Permissions for Azure Onboarding, Detection, and Remediation
  • Learn About
    • Saner CNAPP Best Practices
    • Secure Your IAM entities with Cloud Infrastructure Entitlement Management (CIEM)
    • Critical Events to Monitor in GCP
    • Saner CSRP Classification Based on Scoring Decision
    • Cloud Cyber Hygiene Scoring(CCHS) Approach
    • Remediation Rollback
    • Automation and Job-driven Remediation
    • Cost and Usage
    • Excessive Permission Categories Evaluated Across Different Cloud Services
    • Publicly Accessible Resources
    • Patch Aging and Patch Impact
    • SecPod Default Benchmarks
    • Watchlists
    • Cloud Workload Protection Platform(CWPP)
    • Overview of Report Views in Saner Cloud
    • Whitelisting Resources
    • Saner Plasma AI Assistant for Seamless User Interaction
    • Critical Events to Monitor in AWS
    • High-Privilege Actions in Critical Activity Logs for AWS
    • Audit Logs in Saner Cloud
    • Excessive Permissions
    • Alerts in SanerCloud
  • Saner COSP User Guide
    • Container Orchestration Asset Exposure(COAE) User Guide
    • Container Orchestration Posture Management(COPM) User Guide
    • Container Orchestration Remediation Management(CORM) User Guide
    • Container Orchestration Entitlement Management(COEM) Userguide
    • Container Orchestration Security Platform (COSP) User Guide
    • Container Orchestration Posture Anomaly(COPA) Userguide
  • Saner Cloud User Guides
    • GCP Cloud Infrastructure Entitlement Management (CIEM) User Guide
    • Azure Cloud Infrastructure Entitlement Management(CIEM) User Guide
    • Cloud Security Risk Prioritization(CSRP) User guide
    • Cloud Cyber Hygiene Score(CCHS) User Guide
    • Cloud Security Remediation Management(CSRM) User Guide
    • AWS Cloud Infrastructure Entitlement Management(CIEM) User Guide
    • Cloud Security Posture Anomaly(CSPA) User Guide
    • Cloud Security Asset Exposure(CSAE) User Guide
    • Cloud Security Posture Management(CSPM) User Guide
  • Tell Me How
    • How to Remediate in Saner Cloud?
    • How to Configure Automation Rule to Remediate Misconfigurations?
    • How to Manage Report Views at Organization-level in Saner Cloud?
    • How to Get a Cohesive View from Saner Cloud Unified Dashboard?
    • How to Use Tags to Quickly Filter Resources?
    • How to Troubleshoot Issues with Audit Logs?
    • How to Manage Groups and Tags in Saner Cloud?
    • How to Manage Report Views for a User Account in Saner Cloud?
    • How to Troubleshoot or Analyze with Critical Activity Logs?
    • How to Setup Alerts Across SanerCloud Tools?
    • How to Take Action on Alert Notifications from SanerCloud?
    • CCHS
      • How to Monitor Resource Risk Trends for CHS?
      • How to Assess Resource Health through Severity Distribution?
      • How to Evaluate Service-Level Risks Using CHS Scores?
      • How to Analyze Cyber Hygiene Scores through Trend Chart?
      • How to Identify High-Risk Resources by Geo Location?
      • How to Get an Overview of Cyber Hygiene for Cloud Resources?
      • How to Review Organization-Level Cyber Hygiene Across Accounts?
      • How to Assess Risk Distribution for Different Cloud Providers?
      • How to Review Major Issues Contributing to the Drop of Cyber Hygiene Score at Account-Level?
      • How to Analyze Module-wise Risk through CHS Distribution?
      • How to View the Cyber Hygiene Score Distributed Across Cloud Environments?
      • How to Track Security Posture with Cyber Hygiene Score?
      • How to Configure Account Weightage?
    • CSRP
      • How to Monitor and Analyze Audit Logs for Risk Prioritization?
      • How to Configure Risk Based Cloud Security Alerts?
      • How to Generate Reports and Visualizations?
      • How to Filter Risks by Tags for Targeted Analysis?
      • How to Manage Prioritized Risks at Account-level?
      • How to View the Detailed Breakdown of a Specific Cloud Cyber Security Standard (CCSS) Risk Finding?
      • How to Review and Prioritize Resources Based on Associated Risks?
      • How to Assess Risk Distribution on Essential Resources?
      • How to Assess and Prioritize Risks Across Resource Categories?
      • How to Identify the Risks Affecting Essential Resources?
      • How to Assess Full Versus Limited Technical Impact of Exploiting an Anomaly?
      • How to Review the Risk Factor Distribution Based on Automatable Reliability?
      • How to Get an Overview of Exploitable Risks?
      • How to Map Risks to MITRE ATT&CK for Threat-Informed Defense?
      • How to Configure Questionnaire and Assess Security Practices Across Core Domains for an Account?
    • CSAE
      • How to Setup Watchlist Configuration for a Resource?
      • How to Identify Outdated Resources for Cleanup?
      • How does Resource Categorization Work in Saner CSAE?
      • How to Identify Resources Exposed to External Network?
      • How to Understand the Resource Footprint Globally Across Various Regions?
      • How to Make Informed Decisions on Your Expenditure based on Resource Usage Graph?
    • CSPM
      • How to Setup Benchmarks in Saner CSPM?
      • How to Use Quick Evaluation Benchmarks?
      • How to Detect Patterns over a Period with Resource Trends?
      • How to Assess System Compliance and Security Posture?
    • CSPA
      • How to Initiate Patch Remediation from CSPA Dashboard?
      • How to Quickly Identify the Detected and Remediated Anomalies for an Account?
      • How to Prioritize Remediation or Fixes based on Confidence Levels?
      • How to Examine the Overall Anomaly Information for Specific Rules or Checks?
      • How to Search and Retrieve Anomaly Data?
      • How to Whitelist Rules or Resources in Cloud Security Scans?
    • CIEM
      • How to See the Active Version for an IAM Policy?
      • How to Address Critical Activities Using Evidence?
      • How to View by Type and Usage for any Identity in CIEM?
      • How to Get Visibility into Cloud Entitlements?
      • How to Use Evidence to Address Policies with Excessive Permission?
      • How to Know the Excessive Permissions on a Specific Service?
      • How to Visually See the Relationship between Identity, Entitlement, Policy, or Permission?
      • How to Determine if a Policy has Excessive Permission?
      • How to Initiate Remediation for Different Identities from CIEM?
    • CSRM
      • Rollback an Applied Remediation
      • How to Configure Automation Rule to Remediate Misconfigurations?
      • How to Create a Patching Task for Items Currently in “Approval Pending” State?
      • How to Evaluate Remediation Effort with Patching Impact Chart?
      • How to Prioritize and Address Older or High-Risk Anomalies with Patch Aging?
      • How to Monitor the Overall Status of the Remediation Job?
      • How do I Get to Know the Regions Impacted by a Specific Rule?
      • How to View the Severity of a Missing Patch Affected by a Rule?
      • How to Address Missing Patches Via Remediation Tasks?
      • How to Quickly Access the Necessary Tool for Remediation and Begin Patching Tasks?
  • Frequently Asked Questions
    • Saner Cloud Technical FAQs
  • Saner Cloud Release Notes
    • Saner Cloud – V.3.0.1.0 Release Notes
    • Saner Cloud – V.3.0.0.0 Release Notes
    • Saner Cloud – V.2.0.0.2 Release Notes
    • Saner Cloud – V.2.0.0.1 Release Notes
    • Saner Cloud – V.2.0.0.0 Release Notes
    • Saner Cloud – V.1.2.0.1 Release Notes
    • Saner Cloud – V.1.2.0.0 Release Notes
    • Saner Cloud – V.1.1.0.0 Release Notes
    • Saner Cloud – V.1.1 Release Notes
    • Saner Cloud – V.1.0 Release Notes
  • Saner COSP Release Notes
    • Saner COSP – V.1.0.0.0 Release Notes

Saner CVEM

  • Saner CVEM Release Notes
    • Release Notes Saner CVEM 6.6
    • Release Notes Saner 6.5
    • Saner Platform Integration Release: ServiceNow Integration Introduced, Freshservice Enhanced
    • Release Notes Saner 6.4.1
    • Release Notes SanerNow 6.4
    • Release Notes SanerNow 6.3.1
    • Release Notes SanerNow 6.3
    • Release Notes SanerNow 6.2.1
    • Release Notes SanerNow 6.2.0.3
    • Release Notes SanerNow 6.2.0.1
    • Release Notes SanerNow 6.2
    • Release Notes SanerNow 6.1.1
    • Release Notes SanerNow 6.1
    • SanerNow Risk Prioritization Launch
    • Release Notes SanerNow 6.0
    • Release Notes SanerNow 5.3.1
    • Release Notes SanerNow 5.3
    • Release Notes SanerNow 5.2
    • Release Notes SanerNow 5.1
    • Release Notes SanerNow 5.0
    • Release Notes SanerNow 4.8.0.0
    • Release Notes SanerNow 4.7.0.0
    • Release Notes SanerNow 4.6.0.0
    • Release Notes SanerNow 4.5.0.0
    • Release Notes SanerNow 4.4.0.0
    • Release Notes SanerNow 4.3.0.0
    • Release Notes SanerNow 4.2.2.1
    • Release Notes SanerNow 4.2.2.0
    • Release Notes SanerNow 4.2.1.0
    • Release Notes SanerNow 4.2.0.0
    • Release Notes SanerNow 4.1.1.0
    • Release Notes SanerNow 4.0.0.5
    • Saner CVEM
      • Release Notes Saner CVEM 6.6
  • Saner CVEM Guide
    • Prerequisites For Saner SaaS Platform Deployment
    • What’s New in Saner CVEM?
    • Getting Started with Saner CVEM
    • Pre-requisites for Saner CVEM Deployment
    • How does Saner CVEM’s deployment architecture work?
  • Saner CVEM Products
    • Overview of Saner Continuous Vulnerability and Exposure Management
    • Saner CVEM Unified Dashboard User Guide
    • Saner CVEM Asset Exposure User Guide
    • Saner CVEM Continuous Posture Anomaly Management User Guide
    • Data Points IT teams can Fetch from Saner CPAM
    • Posture Anomaly Computation Rules
    • Saner CVEM Vulnerability Management User Guide
    • Saner CVEM Compliance Management User Guide
    • Saner CVEM Risk Prioritization User Guide
    • Saner CVEM Patch Management User Guide
    • Saner CVEM Endpoint Management User Guide
    • Saner CVEM Remote Scripting User Guide
    • Saner CVEM Remote Access User Guide
    • Saner CVEM Network Scanner User Guide
    • Saner CVEM Cyber Hygiene Score User Guide
  • How Tos
    • Saner AE
      • How to blacklist and whitelist applications in Saner AE?
      • How to manage asset licenses using Saner AE?
      • How to run an asset scan using Saner AE?
    • Saner CPAM
      • How to create new response in PA tool?
      • How to build your own detection and response in PA tool?
      • How to whitelist an entire PA ID?
      • How to configure Posture Anomaly tool for custom detection?
      • How to fix Anomalies from PA dashboard?
      • How to fix anomalies detected in your account from All Anomalies Page?
      • How to fix anomalies from PA Summary page?
      • How to delete PA scan preferences?
      • How to schedule PA Scans on Daily, Weekly, and Monthly basis?
      • How to launch Posture Anomaly scans?
    • Saner VM
      • How to automate and schedule vulnerability scans?
      • How to exclude vulnerabilities in Saner VM tool
      • How to manage excluded vulnerabilities in Saner VM?
      • How to remediate vulnerabilities from vulnerability management dashboard?
    • Saner CM
      • How to run a compliance scan?
      • How to custom create a security policy?
      • How to align with PCI security compliance management?
      • How to align with NIST 800-171 security compliance management?
      • How to align with NIST 800-53 security compliance management?
      • How to align with HIPAA security compliance management using Saner CM?
    • Saner PM
      • How to fix firmware in Saner?
      • How to exclude patches in Saner PM?
      • How to manage excluded patches in Saner PM?
      • How to automate patch management in Saner PM?
      • How to roll back patches in Saner PM?
      • How to apply missing patches in Saner PM?
      • How to apply the most critical patches in Saner PM?
      • How to perform custom remediation for applications that require paid patches using Saner PM
      • How to check the status of patching activity?
    • Saner EM
      • How to collect all security events from Windows Events Log?
      • How to check password policy set in Windows systems?
      • How to check status of DEP in Windows systems?
      • How to check faulty Anti-Virus (AV) status in Windows systems?
      • How to check for Anti-Virus (AV) status in Windows systems?
      • How to check account lockout policy on Windows systems?
      • How to check if Bit-locker protection is OFF in Windows systems?
      • How to list all inactive users on Windows systems?
      • How to list all guest accounts in Windows systems?
      • How to list all Administrator accounts on Windows systems?
      • How to list last-logon details of users on Windows systems?
      • How to identify all users in Windows systems?
      • How to collect all services that are currently running in Windows systems?
      • How to list all Groups in Windows systems?
      • How to collect all keyboard and pointing devices connected to Windows systems?
      • How to collect all storage devices connected to Windows systems?
      • How to investigate total RAM or CPU threshold (greater than or equal to 80%) in Windows systems?
      • How to collect operating systems information in Windows?
      • How to investigate disks running out of space (<100 MB) in Windows systems?
      • How to collect and investigate disk information on Windows systems?
      • How to collect all installed patches in Windows systems?
      • How to collect all software patches that are hidden in the Windows Update server?
      • How to check the status of Windows Update Server (WSUS/SCCM)?
      • How to collect BIOS information such as serial number, version, manufacturer in Windows systems?
      • How to collect all the important missing patches in Windows systems?
      • How to check wireless security in Linux systems?
      • How to collect mounted disk information on Linux systems?
      • How to check wireless signal quality in Linux systems?
      • How to check all firewall policies on Linux systems?
      • How to collect all Dynamic Host Configuration Protocol (DHCP) information on Linux systems?
      • How to collect DNS information on Linux systems?
      • How to collect ARP entries that are created when a hostname is resolved to an IP address and then to a MAC addressing in Linux?
      • How to check wireless signal quality in Windows systems?
      • How to check wireless security in Windows systems?
      • How to collect all open ports in Windows systems?
      • How to collect all network interfaces in Windows systems?
      • How to investigate DNS cache on Windows systems?
      • How to check all firewall policies on Windows systems?
      • How to collect DNS information on Windows systems?
      • How to collect all the applications with an unknown publisher in Linux systems?
      • How to perform system tuning?
      • How to collect all software licenses in Windows systems?
      • How to identify potentially unwanted programs such as torrent downloaders or unnecessary toolbars running on Windows systems?
      • How to collect a list of applications that are started when you boot your computer?
      • How to collect all the applications with an unknown publisher in Windows systems?
      • How to collect all software licenses in Mac systems?
      • How to collect ARP entries that are created when a hostname is resolved to an IP address and then to a MAC addressing Windows?
      • How to collect all families of operating systems such as Windows, Unix, and macOS?
      • How to collect environment variables set in all operating systems?
      • How to collect all the applications with an unknown publisher in Mac systems?
      • How to delete and quarantine a file?
      • How to start and stop the processes in Saner?
      • How to block blacklisted applications in Saner?
      • How to enable/disable devices in Saner
      • How to manually import devices into Saner?
      • How to deploy software in Saner EM?
      • How to enable and disable firewall settings in Saner AE?
      • How to collect all shared resources on Windows systems?
      • How to collect all Dynamic Host Configuration Protocol (DHCP) information on Windows systems?
      • How to connect to a client machine graphically using Saner Remote Access
  • FAQs
    • Saner CVEM Technical FAQs

Security Intelligence for Saner CVEM

  • Overview of Security Content and Intelligence
  • Security Content Statistics
  • OVAL Definitions Platform Coverage
  • OVAL Definitions Class-wise Distribution
  • OVAL Definitions Family-wise Distribution
  • Application and OS Remediation Coverage
  • Compliance Benchmark Coverage
  • List of Vulnerability to Exploit/Malware Mapping covered in Saner
  • Network Scanner Product Support Matrix
  • Privilege levels for authenticated scans using Saner Network Scanner

Security Intelligence for Saner Cloud

  • Benchmark Compliance Rules in AWS, Azure, and GCP
    • GCP
      • SecPod Rules in GCP
        • SecPod Default Rules in GCP: An Overview
        • Understand SecPod Default Rules in GCP
        • Understand SecPod Global Rules in GCP
        • Understand SecPod Regional Rules in GCP
      • CIS Rules in GCP
        • CIS Benchmark Compliance Rules in GCP: An Overview
        • Understand CIS 4.0.0 Rules in GCP
        • Understand CIS 4.0.0 Global Rules in GCP
        • Understand CIS 4.0.0 Regional Rules in GCP
    • AWS
      • SecPod Rules in AWS
        • SecPod Default Rules in AWS: An Overview
        • Understand SecPod Default Rules in AWS
        • Understand SecPod Global Rules in AWS
        • Understand SecPod Regional Rules in AWS
      • PCI DSS 3.2.1 Rules in AWS
        • PCI DSS 3.2.1 Rules in AWS: An Overview
        • Understand PCI DSS 3.2.1 Rules in AWS
        • Understand PCI DSS 3.2.1 Global Rules in AWS
        • Understand PCI DSS 3.2. 1 Regional in AWS
      • CIS Rules in AWS
        • CIS Rules in AWS: An Overview
        • Understand CIS Rules in AWS
        • Understand CIS 3.0.0 Rules in AWS
        • Understand CIS 4.0.1 Rules in AWS
        • Understand CIS 4.0.0 Rules in AWS
        • Understand CIS 3.0.0 Global Rules in AWS
        • Understand CIS 4.0.0 Global Rules in AWS
        • Understand CIS 3.0.0 Regional Rules in AWS
        • Understand CIS 4.0.0 Regional Rules in AWS
      • SOC 2 Rules in AWS
        • SOC 2 Rules in AWS: An Overview
        • Understand SOC 2 Rules in AWS
        • Understand SOC 2 Global Rules in AWS
        • Understand SOC 2 Regional Rules in AWS
      • HIPAA HITRUST Rules in AWS
        • HIPAA HITRUST Rules in AWS: An Overview
        • Understand HIPAA HITRUST Rules in AWS
        • Understand HIPAA HITRUST Global Rules in AWS
        • Understand HIPAA HITRRUST Regional Rules in AWS
      • NIST 800-53 Revision 5 Rules in AWS
        • NIST 800-53 Revision 5 Rules in AWS: An Overview
        • Understand NIST 800-53 Revision 5 Rules in AWS
        • Understand NIST 800-53 Revision 5 Global Rules in AWS
        • Understand NIST 800-53 Revision 5 Regional Rules in AWS
    • Azure
      • CIS Rules in Azure
        • CIS Rules in Azure: An Overview
        • Understand CIS 1.2.0 Rules in Azure
        • Understand CIS 2.1.0 Rules in Azure
        • Understand CIS 1.1.0 Benchmark Compliance Rules in Azure
        • Understand CIS 3.0.0 Benchmark Compliance Rules in Azure
        • Understand CIS 1.2.0 Global Benchmark Compliance Rules in Azure
        • Understand CIS 2.1.0 Global Benchmark Compliance Rules in Azure
        • Understand CIS 3.0.0 Global Benchmark Compliance Rules in Azure
        • Understand CIS 2.1.0 Regional Benchmark Compliance Rules in Azure
        • Understand CIS 3.0.0 Regional Benchmark Compliance Rules in Azure
      • NIST 800-53 Revision Rules in Azure
        • NIST 800-53 Revision 5 Rules in Azure: An Overview
        • Understand NIST 800-53 Revision 5 Rules in Azure
        • Understand NIST 800-53 Revision 5 Global Rules in Azure
        • Understand NIST 800-53 Revision 5 Regional Rules in Azure
      • SecPod Rules in Azure
        • SecPod Default Rules in Azure: An Overview
        • Understand SecPod Global Rules in Azure
        • Understand SecPod Regional Rules in Azure
        • Understand SecPod Default Rules in Azure
      • HIPAA HITRUST Rules in Azure
        • HIPAA HITRUST Rules in Azure: An Overview
        • Understand HIPAA HITRUST 14.7.0 Rules in Azure
        • Understand HIPAA HITRUST 14.7.0 Global Rules in Azure
        • Understand HIPAA HITRUST 14.7.0 Regional Rules in Azure
      • PCI DSS Rules in Azure
        • PCI DSS 3.2.1 Rules in Azure: An Overview
        • Understand PCI DSS 4.0 Rules in Azure
        • Understand PCI DSS 4.0 Global Rules in Azure
        • Understand PCI DSS 4.0 Regional Rules in Azure
      • SOC 2 Rules in Azure
        • SOC 2 Rules in Azure: An Overview
        • Understand SOC2 Rules in Azure
        • Understand SOC2 Global Rules in Azure
        • Understand SOC2 Regional Rules in Azure
  • Posture Anomaly Checks in AWS and Azure
    • Implementing Posture Anomaly Checks in AWS
    • Implementing Posture Anomaly Checks in Azure
  • Infrastructure Entitlement Checks in AWS, Azure, and GCP
    • Implementing Infrastructure Entitlement Checks in AWS
    • Implementing Infrastructure Entitlement Checks in Azure
    • Implementing Infrastructure Entitlement Checks in GCP
View Categories
  • Home
  • Docs
  • Saner Cloud
  • Saner COSP User Guide
  • Container Orchestration Entitlement Management(COEM) Userguide

Container Orchestration Entitlement Management(COEM) Userguide

Print Friendly, PDF & Email

Cloud Orchestration Entitlement Management (COEM) tool is designed to provide  visibility, control, and governance over access permissions within containerized environments, particularly in Kubernetes ecosystems. It enables organizations to systematically identify excessive permissions across various identities, including Kubernetes users, groups, service accounts, roles, and cluster roles, ensuring that access rights are aligned with the principle of least privilege.

By offering detailed permission insights, COEM helps security and operations teams review and analyze entitlement data at a granular level, making it easier to detect privilege sprawl and reduce unnecessary or risky access. It also allows continuous tracking of non-compliant or excessive permission categories over time, helping organizations understand how access risks evolve and whether remediation efforts are effective.

In addition, COEM supports monitoring of entitlement entity counts and access trends, enabling teams to observe patterns and anomalies in permission usage. It also facilitates the identification and assessment of Kubernetes cluster events, aiding in faster troubleshooting and root cause analysis. With built-in tracking of excessive permission trends and remediation outcomes, organizations can measure the impact of their security initiatives.

Finally, COEM provides actionable fix recommendations, empowering teams to remediate identified issues efficiently and maintain a secure, compliant, and well-governed cloud orchestration environment.

Identify Excessive Permissions Across Identities

Identity permissions in container orchestration provide complete visibility and control over how users, groups, service accounts, and roles access and interact with containerized workloads and cluster resources.

By continuously assessing permissions and identifying over-privileged identities, you can make sure that access rights align with operational needs and adhere to least-privilege principles.

The Identity Permissions Overview Dashboard in Saner Cloud COEM helps administrators quickly identify security risks from excessive or misaligned privileges across the different categories: Users, Groups, Service Accounts, Cluster Roles, and Roles.

Each block highlights where excessive permissions are concentrated, so administrators can prioritize remediation. The dashboard’s purpose is to enforce the principle of least privilege across users, groups, service accounts, and roles at both cluster and namespace levels.

The system automatically scans the account on a regular basis and displays the count of over-privileged entities across all the relevant categories.

Here’s a quick look at what each block indicates:

Users

Track individual accounts and make sure the user accounts only have the permissions necessary for their role. This view also helps prevent privilege creep where users accumulate unnecessary rights over time.

The Users section lists all individual accounts with access to the environment and highlights those with excessive permissions.

Groups

The Groups view helps manage collections of users with shared permissions. By making sure that group-level access is properly scoped you can avoid configured groups that unintentionally grants broad access to many users at once.

Groups provide a summary of all configured access groups and highlights those with permissions that exceed operational requirements.

Service Accounts

Service Accounts focus on accounts used by applications or automated services with the goal to keep these accounts tightly controlled, since they often run continuously and can be exploited if over‑privileged. It highlights service accounts with elevated privileges, which are frequently overlooked but present significant security risks if compromised.

Cluster Roles

Govern permissions that apply across the entire cluster, so the focus is on reducing excessive rights to minimize cluster-wide security risks.

Cluster Roles provides insights into access policies at the cluster level that affect multiple namespaces or services. It emphasizes roles with extensive or administrative permissions, allowing administrators to evaluate and improve security boundaries across the cluster.

Roles

Defines permissions at the namespace level to ensure fine-grained access control within specific environments, preventing unnecessary escalation of privileges beyond what’s needed locally.

Roles address access roles specific to namespaces or projects. It aids in identifying localized roles with excessive privileges, allowing for precise control over permissions and ensuring strong internal access segregation.

Review the Detailed Permission Data

You can review the detailed permission data and take corrective actions directly from the Identity Permissions Overview by clicking the View Details button in each block. This allows faster analysis and remediation of security exposures.

The table outlines the sections within each details page.

SectionWhat it Highlights?
HeaderThe selected Kubernetes user’s name, unique identifier, and reference details, along with a clear security indicator that shows if the user configuration is secure or poses risks.
Resource InformationProvides essential metadata about the user, including the resource type, namespace association, creation details, and if it is a virtual resource or a cluster-wide resource.
Security and ConfigurationKey security attributes, such as the user’s overall security status, if they are external to the cluster, and configuration aspects related to virtual resources.
AssociationsVarious Kubernetes entities linked to the user, including roles, cluster roles, groups, service accounts, and service account groups. This helps visualize how the user interacts with other resources in the cluster.
Visualization graphInteractive view of the user’s relationships and bindings within the cluster, displaying connected entities like roles and namespaces. It uses visual indicators to represent secure configurations and provides controls to zoom, expand, or fit the graph for better navigation.

View Detailed Configuration and Security Insights for Kubernetes Users

The User Details page allows you to access in-depth information about the selected user, including their security status, role associations, and a visual representation of their relationships within the cluster. This allows administrators to evaluate user permissions, identify potential misconfigurations, and ensures secure access control within the Kubernetes environment.

View Detailed Configuration and Security Insights for Kubernetes Groups

The Group Details page allows you to access in-depth information about the selected group, including their security status, role associations, and a visual representation of their relationships within the cluster. This allows administrators to evaluate group permissions, identify potential misconfigurations, and ensures secure access control within the Kubernetes environment.

The selected Kubernetes group name, unique identifier, and reference details, along with a clear security indicator shows if the group configuration is secure or poses risks.

View Detailed Configuration and Security Insights for Service Accounts

This details view provides a centralized overview of Kubernetes users, service accounts, and system components interacting with the cluster, enabling administrators to effectively monitor and manage access. It includes users, application-specific service accounts, system controllers, networking components like Calico, and bootstrap or certificate-related entities. By offering complete visibility into these service accounts, the view supports access control validation, security monitoring, and operational awareness. It helps teams identify misconfigurations, enforce least-privilege principles, and ensure that all cluster interactions are properly governed, making it essential for maintaining the security and integrity of the container orchestration environment.

View Detailed Configuration and Security Insights for Cluster Roles

This details view provides a centralized overview of all identities within the Kubernetes cluster, including users, service accounts, and system components, enabling effective access management and security governance. It lists users, application-specific service accounts, system controllers, networking components, and cluster initialization entities, each playing a role in cluster operations. By offering complete visibility into these identities, the view helps administrators enforce role-based access control, detect over-privileged or unused accounts, and ensure secure interactions across the environment. Overall, it supports operational clarity, compliance, and adherence to least-privilege principles, making it critical for maintaining the security and integrity of the container orchestration platform.

View Detailed Configuration and Security Insights for Roles

The Roles Details page allows you to access in-depth information about the selected role, including their security status, role associations, and a visual representation of their relationships within the cluster. This allows administrators to evaluate role permissions, identify potential misconfigurations, and ensures secure access control within the Kubernetes environment.

Identify Privilege Sprawl

Security teams can quickly identify areas with concentrated privilege sprawl and prioritize the remediation of the most critical permission issues.

The Excessive Categories dashboard block classifies excessive permissions into key risk categories and displays the number of occurrences for each at the end of each scan.

Track the Variation in the Number of Excessive or Non-Compliant Categories Over Time

The Excessive trend analysis helps track and evaluate fluctuations, identify improvement patterns, and enable data-driven decisions to reduce excessive instances, strengthen configuration management, and maintain a secure and compliant environment.

In Saner COEM dashboard, the Excessive Categories Trend illustrates the variation in the number of excessive or non-compliant categories over time, such as assets, configurations, or permissions that exceed defined thresholds or acceptable limits. This helps monitor how these categories evolve across a given period, providing insight into the effectiveness of remediation and compliance efforts.

Identify and Assess Kubernetes Cluster Events for Troubleshooting

Kubernetes Events are essential for monitoring and troubleshooting activities within container orchestration environments. These events facilitate an understanding of what is happening within the cluster and help diagnose potential issues efficiently.

Saner Cloud COEM provides real-time visibility into high-severity events that impact Kubernetes workloads and resources. The Critical Events dashboard presents a tabular view of vital event details, including the name, type, reason, message, source, namespace, and timestamp for subsequent troubleshooting and resolution of critical issues.

Event Name

The name of the affected Kubernetes object such as a Pod, Deployment, or Node.

Event Types and Characteristics

Event TypeDescriptionTypical Scenarios
NormalIndicates successful or expected operationPod creation, scaling activities
WarningHighlights potential issues that may need attentionResource constraints, configuration errors
ErrorRepresents critical failures that impact system performanceDeployment failures, node unavailability

Reason

A short reason describing why the event occurred (For example, Configuration Error, Security Breach, and so on).

Message

A detailed description of the event that helps understand the root cause or impact.

Source

Identifies the component or controller in Kubernetes that generated the event (For example, kubelet, scheduler, replica-set controller).

Source Type

Specifies the type of the source (For example, Node, Controller, API Server) that reported the event.

Namespace

Kubernetes namespace where the event occurred and allows easy isolation of issues within specific workloads.

Timestamp

Exact date and time when the event was recorded, assisting in event correlation and timeline analysis.

Monitor Entitlement Entity Counts and Access Trends Over Time

The Total Counts Over Time chart in the Container Orchestration Remediation Management (CORM) dashboard provides a time-based view of the overall number of entitlement-related entities, such as ClusterRoles, ServiceAccounts, Roles, Groups, and Users. By plotting these counts across a selected period, the chart helps users monitor trends, understand how access configurations evolve, and assess the impact of remediation activities.

The chart helps quick identification of increases or reductions in specific entity types, highlights potential security risks due to growing access footprints, and supports continuous tracking of remediation effectiveness to maintain a secure and well-managed container environment.

Track Excessive Permission Trends and Remediation Effectiveness Over Time

The Excessive Permissions Over Time chart in the Container Orchestration Remediation Management (CORM) dashboard provides a trend-based visualization of permission-related risks across the container environment. Its primary purpose is to help you monitor how excessive or over-privileged access configurations evolve over a selected time period, enabling better tracking of security posture and remediation effectiveness.

The chart displays time on the X-axis and the number of excessive permission instances on the Y-axis, with different colored bands representing varying severity levels (such as Critical, High, Medium, and Low). This layered visualization allows users to quickly assess the distribution and volume of risks over time.

By analyzing this chart, you can:

  • Identify if excessive permissions are increasing, decreasing, or remaining constant.
  • Evaluate the impact of remediation efforts by observing reductions in higher severity issues.
  • Detect persistent or recurring permission risks that require further investigation.

Overall, this chart helps to track remediation progress, identify trends in entitlement risks, and ensure continuous improvement in access control security within containerized environments.

Fix Recommendations

The Fix Recommendations table in the Container Orchestration Entitlement Management (COEM) dashboard provides a detailed view of identified entitlement and access control misconfigurations, along with recommended remediation actions. This table helps users analyze non-compliant Kubernetes RBAC configurations and take corrective measures efficiently.

You can use this table to quickly identify high-risk permission issues, understand their impact, and apply appropriate fixes to ensure secure and compliant access control within the container environment.

Each row in the table represents a specific rule violation and includes the following details:

Rule ID

Unique identifier for the detected issue.

Rule Title

Brief description of the entitlement misconfiguration.

Rule Description

Detailed explanation of the rule and the associated risk.

Not Compliant Resources

Lists the resources that do not adhere to the defined policy.

Namespaces

Indicates the Kubernetes namespace where the issue is present.

Affected Type

Specifies the type of resource impacted (e.g., Group, ServiceAccount).

Severity

Categorizes the risk level (Critical, High, Medium) to help prioritize remediation.

Fix

Provides an option to initiate or view recommended remediation actions. Click the Fix(wrench) icon corresponding to a rule id  and follow the wizard that guides you through the process of selecting and applying the necessary patches.

Share This Article :

  • X
  • LinkedIn
Still stuck? How can we help?

Saner Documentation Feedback

Container Orchestration Remediation Management(CORM) User GuideContainer Orchestration Security Platform (COSP) User Guide
Table of Contents
  • Identify Excessive Permissions Across Identities
    • Review the Detailed Permission Data
      • View Detailed Configuration and Security Insights for Kubernetes Users
      • View Detailed Configuration and Security Insights for Kubernetes Groups
      • View Detailed Configuration and Security Insights for Service Accounts
      • View Detailed Configuration and Security Insights for Cluster Roles
      • View Detailed Configuration and Security Insights for Roles
  • Identify Privilege Sprawl
  • Track the Variation in the Number of Excessive or Non-Compliant Categories Over Time
  • Identify and Assess Kubernetes Cluster Events for Troubleshooting
  • Monitor Entitlement Entity Counts and Access Trends Over Time
  • Track Excessive Permission Trends and Remediation Effectiveness Over Time
  • Fix Recommendations
Copyright 2026 - SecPod. All Rights Reserved. Privacy Policy.
SanerNow Version 6.5.x