Skip to content
SecPod  – Documentation
  • Docs Home
  • Categories
    • Saner Platform
    • Saner Cloud
    • Saner CVEM
    • Security Intelligence
  • More
    • About SecPod
    • Blog
    • Security & Privacy
    • Support Center
    • Resources
  • SCHEDULE A DEMO
  • Toggle website search
Search this website
Menu Close
  • Docs Home
  • Categories
    • Saner Platform
    • Saner Cloud
    • Saner CVEM
    • Security Intelligence
  • More
    • About SecPod
    • Blog
    • Security & Privacy
    • Support Center
    • Resources
  • SCHEDULE A DEMO
  • Toggle website search
  • Docs Home
  • Categories
    • Saner Platform
    • Saner Cloud
    • Saner CVEM
    • Security Intelligence
  • More
    • About SecPod
    • Blog
    • Security & Privacy
    • Support Center
    • Resources
  • SCHEDULE A DEMO

Saner Platform

  • Saner Platform Release Notes
    • Saner Platform Integration Release: ServiceNow Integration Introduced, Freshservice Enhanced
    • Release Notes Saner 6.4.1
    • Release Notes SanerNow 6.4
    • Release Notes SanerNow 6.3.1
    • Release Notes SanerNow 6.3
    • Release Notes SanerNow 6.2.1
    • Release Notes SanerNow 6.2.0.3
    • Release Notes SanerNow 6.2.0.1
    • Release Notes SanerNow 6.2
    • Release Notes SanerNow 6.1.1
    • Release Notes SanerNow 6.1
    • Release Notes SanerNow 6.0
    • Release Notes SanerNow 5.3.1
    • Release Notes SanerNow 5.3
    • Release Notes SanerNow 5.2
    • Release Notes SanerNow 5.1
    • Release Notes SanerNow 5.0
    • Release Notes SanerNow 4.8.0.0
    • Release Notes SanerNow 4.7.0.0
    • Release Notes SanerNow 4.6.0.0
    • Release Notes SanerNow 4.5.0.0
    • Release Notes SanerNow 4.4.0.0
    • Release Notes SanerNow 4.3.0.0
    • Release Notes SanerNow 4.2.2.1
    • Release Notes SanerNow 4.2.2.0
    • Release Notes SanerNow 4.2.1.0
    • Release Notes SanerNow 4.2.0.0
    • Release Notes SanerNow 4.1.1.0
    • Release Notes SanerNow 4.0.0.5
  • Saner Platform Guide
    • Prerequisites For Saner SaaS Platform Deployment
    • Saner Administration Guide
    • Saner Device Management User Guide
    • Saner Platform and ServiceNow Integration Guide
    • Saner Platform and Freshservice Integration Guide
    • Saner Platform Function Guides
  • FAQs
    • Saner CVEM Technical FAQs
  • How Tos
    • General
      • How to increase the subscription count for an Account in Saner CVEM
      • How to increment license count for an Organization in Saner CVEM
      • How to provision Saner tools for an Organization
      • How to change subscription type in Saner CVEM
      • How to sign-up with Saner CVEM?
      • How to create a new account in Saner CVEM?
      • How to create a new user in Saner CVEM?
      • How to enable SSO authentication policy in Saner CVEM?
      • How to set alerts in Saner?
      • How to view, download and filter the audit logs?
      • How to designate Saner Agent to perform network scan?
      • How to Co-Brand with your logo?
      • How to fetch the details of the mandatory fields from the Okta account?
      • How to create MFA policy for Okta?
      • How to fetch the details of the mandatory fields from the PingID account?
      • How to create MFA policy for PingID?
      • How to fetch the details of the mandatory fields from the PingOne account?
      • How to create MFA policy for PingOne?
      • How to download and install Saner Agent in Mac?
      • How to download and install Saner agent in Linux?
      • How to download and install the Saner agent in Windows?
      • How to update the expiry date of an existing subscription?
      • How to manage users and their preferences using role-based access?
      • How to uninstall Saner Agent using Saner Offline deployer tool.
      • How to onboard a new organization?
      • How to deploy Saner Agent using Saner Offline deployer tool.
      • How to install a Saner agent through the command line?
      • How to uninstall the Saner agent through command line?
    • Saner Reports
      • How to configure mail settings to email Report PDF?
      • How to create a custom report in Saner?
      • How to schedule for the report back up?
    • Saner Device Management
      • How to create custom groups in Saner CVEM
    • Saner Mail Settings
      • How to create new mail settings in Saner?
      • How to use OAuth-enabled authentication in Saner mail settings
      • How to create OAuth Client ID and Client Secret for Gmail
      • How to create OAuth Client ID and Client Secret for Microsoft 365.
  • Supported OSs and Platforms
    • Operating Systems and Platforms Supported
    • Supported Third-party Applications for Patching

Saner Cloud

  • Before You Begin
    • Glossary of Terms
    • Read me First
  • Get Started
    • Prerequisites For Saner SaaS Platform Deployment
    • Saner Cloud Deployment Guides
      • Azure Onboarding
      • Troubleshooting
      • Get Started with Saner CNAPP AWS Cloud Deployment V1.0
      • Onboarding with AWS Credentials(Least Recommended Method)
      • Onboarding with AWS Role(Manual)
      • Onboarding with AWS Role CloudFormation (Automatic): Recommended
    • Roles and Permissions
      • Roles and Permissions for AWS Remediation Access
      • Roles and Permissions for Azure Onboarding, Detection, and Remediation
  • Learn About
    • Saner CSRP Classification Based on Scoring Decision
    • Cloud Cyber Hygiene Scoring(CCHS) Approach
    • Remediation Rollback
    • Automation and Job-driven Remediation
    • Cost and Usage
    • Excessive Permission Categories Evaluated Across Different Cloud Services
    • Publicly Accessible Resources
    • Patch Aging and Patch Impact
    • SecPod Default Benchmarks
    • Watchlists
    • Cloud Workload Protection Platform(CWPP)
    • Overview of Report Views in Saner Cloud
    • Whitelisting Resources
    • Saner Plasma AI Assistant for Seamless User Interaction
    • Critical Events to Monitor in AWS
    • High-Privilege Actions in Critical Activity Logs for AWS
    • Audit Logs in Saner Cloud
    • Excessive Permissions
    • Alerts in SanerCloud
  • User Guides
    • Cloud Security Risk Prioritization(CSRP) User guide
    • Cloud Cyber Hygiene Score(CCHS) User Guide
    • Cloud Security Remediation Management(CSRM) User Guide
    • AWS Cloud Infrastructure Entitlement Management(CIEM) User Guide
    • Cloud Security Posture Anomaly(CSPA) User Guide
    • Cloud Security Asset Exposure(CSAE) User Guide
    • Cloud Security Posture Management(CSPM) User Guide
  • Tell Me How
    • How to Remediate in Saner Cloud?
    • How to Configure Automation Rule to Remediate Misconfigurations?
    • How to Manage Report Views at Organization-level in Saner Cloud?
    • How to Get a Cohesive View from Saner Cloud Unified Dashboard?
    • How to Use Tags to Quickly Filter Resources?
    • How to Troubleshoot Issues with Audit Logs?
    • How to Manage Groups and Tags in Saner Cloud?
    • How to Manage Report Views for a User Account in Saner Cloud?
    • How to Troubleshoot or Analyze with Critical Activity Logs?
    • How to Setup Alerts Across SanerCloud Tools?
    • How to Take Action on Alert Notifications from SanerCloud?
    • CCHS
      • How to Monitor Resource Risk Trends for CHS?
      • How to Assess Resource Health through Severity Distribution?
      • How to Evaluate Service-Level Risks Using CHS Scores?
      • How to Analyze Cyber Hygiene Scores through Trend Chart?
      • How to Identify High-Risk Resources by Geo Location?
      • How to Get an Overview of Cyber Hygiene for Cloud Resources?
      • How to Review Organization-Level Cyber Hygiene Across Accounts?
      • How to Assess Risk Distribution for Different Cloud Providers?
      • How to Review Major Issues Contributing to the Drop of Cyber Hygiene Score at Account-Level?
      • How to Analyze Module-wise Risk through CHS Distribution?
      • How to View the Cyber Hygiene Score Distributed Across Cloud Environments?
      • How to Track Security Posture with Cyber Hygiene Score?
      • How to Configure Account Weightage?
    • CSRP
      • How to Monitor and Analyze Audit Logs for Risk Prioritization?
      • How to Configure Risk Based Cloud Security Alerts?
      • How to Generate Reports and Visualizations?
      • How to Filter Risks by Tags for Targeted Analysis?
      • How to Manage Prioritized Risks at Account-level?
      • How to View the Detailed Breakdown of a Specific Cloud Cyber Security Standard (CCSS) Risk Finding?
      • How to Review and Prioritize Resources Based on Associated Risks?
      • How to Assess Risk Distribution on Essential Resources?
      • How to Assess and Prioritize Risks Across Resource Categories?
      • How to Identify the Risks Affecting Essential Resources?
      • How to Assess Full Versus Limited Technical Impact of Exploiting an Anomaly?
      • How to Review the Risk Factor Distribution Based on Automatable Reliability?
      • How to Get an Overview of Exploitable Risks?
      • How to Map Risks to MITRE ATT&CK for Threat-Informed Defense?
      • How to Configure Questionnaire and Assess Security Practices Across Core Domains for an Account?
    • CSPA
      • How to Initiate Patch Remediation from CSPA Dashboard?
      • How to Quickly Identify the Detected and Remediated Anomalies for an Account?
      • How to Prioritize Remediation or Fixes based on Confidence Levels?
      • How to Examine the Overall Anomaly Information for Specific Rules or Checks?
      • How to Search and Retrieve Anomaly Data?
      • How to Whitelist Rules or Resources in Cloud Security Scans?
    • CIEM
      • How to See the Active Version for an IAM Policy?
      • How to Address Critical Activities Using Evidence?
      • How to View by Type and Usage for any Identity in CIEM?
      • How to Get Visibility into Cloud Entitlements?
      • How to Use Evidence to Address Policies with Excessive Permission?
      • How to Know the Excessive Permissions on a Specific Service?
      • How to Visually See the Relationship between Identity, Entitlement, Policy, or Permission?
      • How to Determine if a Policy has Excessive Permission?
      • How to Initiate Remediation for Different Identities from CIEM?
    • CSRM
      • Rollback an Applied Remediation
      • How to Configure Automation Rule to Remediate Misconfigurations?
      • How to Create a Patching Task for Items Currently in “Approval Pending” State?
      • How to Evaluate Remediation Effort with Patching Impact Chart?
      • How to Prioritize and Address Older or High-Risk Anomalies with Patch Aging?
      • How to Monitor the Overall Status of the Remediation Job?
      • How do I Get to Know the Regions Impacted by a Specific Rule?
      • How to View the Severity of a Missing Patch Affected by a Rule?
      • How to Address Missing Patches Via Remediation Tasks?
      • How to Quickly Access the Necessary Tool for Remediation and Begin Patching Tasks?
    • CSAE
      • How to Setup Watchlist Configuration for a Resource?
      • How to Identify Outdated Resources for Cleanup?
      • How does Resource Categorization Work in Saner CSAE?
      • How to Identify Resources Exposed to External Network?
      • How to Understand the Resource Footprint Globally Across Various Regions?
      • How to Make Informed Decisions on Your Expenditure based on Resource Usage Graph?
    • CSPM
      • How to Setup Benchmarks in Saner CSPM?
      • How to Use Quick Evaluation Benchmarks?
      • How to Detect Patterns over a Period with Resource Trends?
      • How to Assess System Compliance and Security Posture?
  • Frequently Asked Questions
    • Saner Cloud Technical FAQs
  • Saner Cloud Release Notes
    • Protected: Saner Cloud – V.2.0.0.2 Release Notes
    • Saner Cloud – V.2.0.0.1 Release Notes
    • Saner Cloud – V.2.0.0.0 Release Notes
    • Saner Cloud – V.1.2.0.1 Release Notes
    • Saner Cloud – V.1.2.0.0 Release Notes
    • Saner Cloud – V.1.1.0.0 Release Notes
    • Saner Cloud – V.1.1 Release Notes
    • Saner Cloud – V.1.0 Release Notes

Saner CVEM

  • Saner CVEM Release Notes
    • Release Notes Saner 6.5
    • Saner Platform Integration Release: ServiceNow Integration Introduced, Freshservice Enhanced
    • Release Notes Saner 6.4.1
    • Release Notes SanerNow 6.4
    • Release Notes SanerNow 6.3.1
    • Release Notes SanerNow 6.3
    • Release Notes SanerNow 6.2.1
    • Release Notes SanerNow 6.2.0.3
    • Release Notes SanerNow 6.2.0.1
    • Release Notes SanerNow 6.2
    • Release Notes SanerNow 6.1.1
    • Release Notes SanerNow 6.1
    • SanerNow Risk Prioritization Launch
    • Release Notes SanerNow 6.0
    • Release Notes SanerNow 5.3.1
    • Release Notes SanerNow 5.3
    • Release Notes SanerNow 5.2
    • Release Notes SanerNow 5.1
    • Release Notes SanerNow 5.0
    • Release Notes SanerNow 4.8.0.0
    • Release Notes SanerNow 4.7.0.0
    • Release Notes SanerNow 4.6.0.0
    • Release Notes SanerNow 4.5.0.0
    • Release Notes SanerNow 4.4.0.0
    • Release Notes SanerNow 4.3.0.0
    • Release Notes SanerNow 4.2.2.1
    • Release Notes SanerNow 4.2.2.0
    • Release Notes SanerNow 4.2.1.0
    • Release Notes SanerNow 4.2.0.0
    • Release Notes SanerNow 4.1.1.0
    • Release Notes SanerNow 4.0.0.5
  • Saner CVEM Guide
    • What’s New in Saner CVEM?
    • Getting Started with Saner CVEM
    • Pre-requisites for Saner CVEM Deployment
    • How does Saner CVEM’s deployment architecture work?
  • How Tos
    • Saner AE
      • How to blacklist and whitelist applications in Saner AE?
      • How to manage asset licenses using Saner AE?
      • How to run an asset scan using Saner AE?
    • Saner CPAM
      • How to create new response in PA tool?
      • How to build your own detection and response in PA tool?
      • How to whitelist an entire PA ID?
      • How to configure Posture Anomaly tool for custom detection?
      • How to fix Anomalies from PA dashboard?
      • How to fix anomalies detected in your account from All Anomalies Page?
      • How to fix anomalies from PA Summary page?
      • How to delete PA scan preferences?
      • How to schedule PA Scans on Daily, Weekly, and Monthly basis?
      • How to launch Posture Anomaly scans?
    • Saner VM
      • How to automate and schedule vulnerability scans?
      • How to exclude vulnerabilities in Saner VM tool
      • How to manage excluded vulnerabilities in Saner VM?
      • How to remediate vulnerabilities from vulnerability management dashboard?
    • Saner CM
      • How to run a compliance scan?
      • How to custom create a security policy?
      • How to align with PCI security compliance management?
      • How to align with NIST 800-171 security compliance management?
      • How to align with NIST 800-53 security compliance management?
      • How to align with HIPAA security compliance management using Saner CM?
    • Saner PM
      • How to fix firmware in Saner?
      • How to exclude patches in Saner PM?
      • How to manage excluded patches in Saner PM?
      • How to automate patch management in Saner PM?
      • How to roll back patches in Saner PM?
      • How to specify Service Level Agreement (SLA) using Remediation SLA in Saner PM?
      • How to apply missing patches in Saner PM?
      • How to apply the most critical patches in Saner PM?
      • How to perform custom remediation for applications that require paid patches using Saner PM
      • How to check the status of patching activity?
    • Saner EM
      • How to collect all security events from Windows Events Log?
      • How to check password policy set in Windows systems?
      • How to check status of DEP in Windows systems?
      • How to check faulty Anti-Virus (AV) status in Windows systems?
      • How to check for Anti-Virus (AV) status in Windows systems?
      • How to check account lockout policy on Windows systems?
      • How to check if Bit-locker protection is OFF in Windows systems?
      • How to list all inactive users on Windows systems?
      • How to list all guest accounts in Windows systems?
      • How to list all Administrator accounts on Windows systems?
      • How to list last-logon details of users on Windows systems?
      • How to identify all users in Windows systems?
      • How to collect all services that are currently running in Windows systems?
      • How to list all Groups in Windows systems?
      • How to collect all keyboard and pointing devices connected to Windows systems?
      • How to collect all storage devices connected to Windows systems?
      • How to investigate total RAM or CPU threshold (greater than or equal to 80%) in Windows systems?
      • How to collect operating systems information in Windows?
      • How to investigate disks running out of space (<100 MB) in Windows systems?
      • How to collect and investigate disk information on Windows systems?
      • How to collect all installed patches in Windows systems?
      • How to collect all software patches that are hidden in the Windows Update server?
      • How to check the status of Windows Update Server (WSUS/SCCM)?
      • How to collect BIOS information such as serial number, version, manufacturer in Windows systems?
      • How to collect all the important missing patches in Windows systems?
      • How to check wireless security in Linux systems?
      • How to collect mounted disk information on Linux systems?
      • How to check wireless signal quality in Linux systems?
      • How to check all firewall policies on Linux systems?
      • How to collect all Dynamic Host Configuration Protocol (DHCP) information on Linux systems?
      • How to collect DNS information on Linux systems?
      • How to collect ARP entries that are created when a hostname is resolved to an IP address and then to a MAC addressing in Linux?
      • How to check wireless signal quality in Windows systems?
      • How to check wireless security in Windows systems?
      • How to collect all open ports in Windows systems?
      • How to collect all network interfaces in Windows systems?
      • How to investigate DNS cache on Windows systems?
      • How to check all firewall policies on Windows systems?
      • How to collect DNS information on Windows systems?
      • How to collect all the applications with an unknown publisher in Linux systems?
      • How to perform system tuning?
      • How to collect all software licenses in Windows systems?
      • How to identify potentially unwanted programs such as torrent downloaders or unnecessary toolbars running on Windows systems?
      • How to collect a list of applications that are started when you boot your computer?
      • How to collect all the applications with an unknown publisher in Windows systems?
      • How to collect all software licenses in Mac systems?
      • How to collect ARP entries that are created when a hostname is resolved to an IP address and then to a MAC addressing Windows?
      • How to collect all families of operating systems such as Windows, Unix, and macOS?
      • How to collect environment variables set in all operating systems?
      • How to collect all the applications with an unknown publisher in Mac systems?
      • How to delete and quarantine a file?
      • How to start and stop the processes in Saner?
      • How to block blacklisted applications in Saner?
      • How to enable/disable devices in Saner
      • How to manually import devices into Saner?
      • How to deploy software in Saner EM?
      • How to enable and disable firewall settings in Saner AE?
      • How to collect all shared resources on Windows systems?
      • How to collect all Dynamic Host Configuration Protocol (DHCP) information on Windows systems?
      • How to connect to a client machine graphically using Saner Remote Access
  • Saner CVEM Products
    • Overview of Saner Continuous Vulnerability and Exposure Management
    • Saner CVEM Unified Dashboard User Guide
    • Saner CVEM Asset Exposure User Guide
    • Saner CVEM Continuous Posture Anomaly Management User Guide
    • Data Points IT teams can Fetch from Saner CPAM
    • Posture Anomaly Computation Rules
    • Saner CVEM Vulnerability Management User Guide
    • Saner CVEM Compliance Management User Guide
    • Saner CVEM Risk Prioritization User Guide
    • Saner CVEM Patch Management User Guide
    • Saner CVEM Endpoint Management User Guide
    • Saner CVEM Remote Scripting User Guide
    • Saner CVEM Remote Access User Guide
    • Saner CVEM Network Scanner User Guide
    • Saner CVEM Cyber Hygiene Score User Guide
  • FAQs
    • Saner CVEM Technical FAQs

Security Intelligence for Saner CVEM

  • Overview of Security Content and Intelligence
  • Security Content Statistics
  • OVAL Definitions Platform Coverage
  • OVAL Definitions Class-wise Distribution
  • OVAL Definitions Family-wise Distribution
  • Application and OS Remediation Coverage
  • Compliance Benchmark Coverage
  • List of Vulnerability to Exploit/Malware Mapping covered in Saner
  • Network Scanner Product Support Matrix
  • Privilege levels for authenticated scans using Saner Network Scanner

Security Intelligence for Saner Cloud

  • Benchmark Compliance Rules in AWS and Azure
    • AWS
      • SecPod Rules in AWS
        • SecPod Default Rules in AWS: An Overview
        • Understand SecPod Default Rules in AWS
        • Understand SecPod Global Rules in AWS
        • Understand SecPod Regional Rules in AWS
      • PCI DSS 3.2.1 Rules in AWS
        • PCI DSS 3.2.1 Rules in AWS: An Overview
        • Understand PCI DSS 3.2.1 Rules in AWS
        • Understand PCI DSS 3.2.1 Global Rules in AWS
        • Understand PCI DSS 3.2. 1 Regional in AWS
      • CIS Rules in AWS
        • CIS Rules in AWS: An Overview
        • Understand CIS Rules in AWS
        • Understand CIS 3.0.0 Rules in AWS
        • Understand CIS 4.0.1 Rules in AWS
        • Understand CIS 4.0.0 Rules in AWS
        • Understand CIS 3.0.0 Global Rules in AWS
        • Understand CIS 4.0.0 Global Rules in AWS
        • Understand CIS 3.0.0 Regional Rules in AWS
        • Understand CIS 4.0.0 Regional Rules in AWS
      • HIPAA HITRUST Rules in AWS
        • HIPAA HITRUST Rules in AWS: An Overview
        • Understand HIPAA HITRUST Rules in AWS
        • Understand HIPAA HITRUST Global Rules in AWS
        • Understand HIPAA HITRRUST Regional Rules in AWS
      • NIST 800-53 Revision 5 Rules in AWS
        • NIST 800-53 Revision 5 Rules in AWS: An Overview
        • Understand NIST 800-53 Revision 5 Rules in AWS
        • Understand NIST 800-53 Revision 5 Global Rules in AWS
        • Understand NIST 800-53 Revision 5 Regional Rules in AWS
      • SOC 2 Rules in AWS
        • SOC 2 Rules in AWS: An Overview
        • Understand SOC 2 Rules in AWS
        • Understand SOC 2 Global Rules in AWS
        • Understand SOC 2 Regional Rules in AWS
    • Azure
      • SecPod Rules in Azure
        • SecPod Default Rules in Azure: An Overview
        • Understand SecPod Global Rules in Azure
        • Understand SecPod Regional Rules in Azure
        • Understand SecPod Default Rules in Azure
      • HIPAA HITRUST Rules in Azure
        • HIPAA HITRUST Rules in Azure: An Overview
        • Understand HIPAA HITRUST 14.7.0 Rules in Azure
        • Understand HIPAA HITRUST 14.7.0 Global Rules in Azure
        • Understand HIPAA HITRUST 14.7.0 Regional Rules in Azure
      • PCI DSS Rules in Azure
        • PCI DSS 3.2.1 Rules in Azure: An Overview
        • Understand PCI DSS 4.0 Rules in Azure
        • Understand PCI DSS 4.0 Global Rules in Azure
        • Understand PCI DSS 4.0 Regional Rules in Azure
      • SOC 2 Rules in Azure
        • SOC 2 Rules in Azure: An Overview
        • Understand SOC2 Rules in Azure
        • Understand SOC2 Global Rules in Azure
        • Understand SOC2 Regional Rules in Azure
      • CIS Rules in Azure
        • CIS Rules in Azure: An Overview
        • Understand CIS 1.2.0 Rules in Azure
        • Understand CIS 2.1.0 Rules in Azure
        • Understand CIS 1.1.0 Benchmark Compliance Rules in Azure
        • Understand CIS 3.0.0 Benchmark Compliance Rules in Azure
        • Understand CIS 1.2.0 Global Benchmark Compliance Rules in Azure
        • Understand CIS 2.1.0 Global Benchmark Compliance Rules in Azure
        • Understand CIS 3.0.0 Global Benchmark Compliance Rules in Azure
        • Understand CIS 2.1.0 Regional Benchmark Compliance Rules in Azure
        • Understand CIS 3.0.0 Regional Benchmark Compliance Rules in Azure
      • NIST 800-53 Revision Rules in Azure
        • NIST 800-53 Revision 5 Rules in Azure: An Overview
        • Understand NIST 800-53 Revision 5 Rules in Azure
        • Understand NIST 800-53 Revision 5 Global Rules in Azure
        • Understand NIST 800-53 Revision 5 Regional Rules in Azure
  • Posture Anomaly Checks in AWS and Azure
    • Implementing Posture Anomaly Checks in AWS
    • Implementing Posture Anomaly Checks in Azure
  • Infrastructure Entitlement Checks in AWS and Azure
    • Implementing Infrastructure Entitlement Checks in Azure
    • Implementing Infrastructure Entitlement Checks in AWS
View Categories
  • Home
  • Docs
  • Saner Cloud
  • User Guides
  • AWS Cloud Infrastructure Entitlement Management(CIEM) User Guide

AWS Cloud Infrastructure Entitlement Management(CIEM) User Guide

Print Friendly, PDF & Email

At the core of Cloud Infrastructure Entitlement Management (CIEM) is the Principle of Least Privilege (PoLP), which ensures that every user, role, service, or application is granted only the minimum permissions necessary to perform its functions. Poor management of these permissions, particularly when accounts have excessive privileges, can lead to insider threats, privilege escalation, and data breaches.

This article demonstrates how CIEM tools like SanerCloud can detect and remediate risky entitlements across AWS.

Follow the links to learn more:

Real-World Scenario of Over-Permissioned Developer Role in AWS

What’s Involved in Detecting and Fixing Excessively Authorized Accounts?

Get Started

See What You’re Protecting from the Dashboard

Review Excessive Permission Summary Across Identity Types

Determine if a Policy has Excessive Permission

Get a Visual of the Relationships between Different Identities

View any Infrastructure in CIEM by Type and Usage

Know the Infrastructure Usage Across Different Users, Groups, Policies, and Roles

Use Evidence to Address Policies with Excessive Permission

Know the Excessive Permissions on a Specific Service

Severity Status to Prioritize Misconfiguration

Initiate Remediation for Different Identities from CIEM

See the Active Version for an IAM Policy

Commonly Asked Questions

Real-World Scenario of Over-Permissioned Developer Role in AWS

A DevOps engineer working in AWS was assigned the “PowerUserAccess” policy to simplify infrastructure testing. Months later, the engineer moved to a different team, but the permissions remained intact. Now, this unused but powerful role becomes an exploitable risk if the credentials were to be compromised.

CIEM detects this risk by:

  • Mapping effective permissions across roles, groups, and inherited policies
  • Correlating with activity logs from services like CloudTrail and Azure Monitor
  • Flagging unused or high-risk entitlements

What’s Involved in Detecting and Fixing Excessively Authorized Accounts?

Data Collection through IAM Inventory Fetching

The process starts with collecting data through the IAM inventory fetching, which is handled by the core ingestion pipeline. Cloud Connectors authenticate with your AWS and Azure accounts to gather IAM-related metadata. This metadata includes user and role permissions, group memberships, trust policies, and both attached and inline policies. Once the data is collected, it is normalized and stored in the internal Identity store, serving as the foundation for identifying accounts with excessive authorizations.

Entitlement Scanner for “Privilege” Misconfiguration Detection

The Entitlement Scanner, which is part of the CIEM module, identifies privilege misconfigurations by applying both static and contextual rules. For example, it checks to ensure that IAM users do not have full access to all services. The rule engine evaluates various conditions, such as overly permissive access (like using wildcards or having admin-level policies), unused or dormant identities, cross-account access without proper constraints, and violations of the principle of least privilege. Any misconfigurations that are identified, are flagged and assigned severity ratings to help prioritize them.

Flagging Over-privileged Entities on the UI

The CIEM UI layer visually highlights overprivileged identities by querying the Identity Store for potential misconfigurations. The frontend presents this information through interactive dashboards, which display affected users, roles, or groups, the severity level of each risk, and the specific rules that have been violated, along with contextual risk details. This approach allows security teams to quickly identify and assess high-risk identity configurations.

Remediation Trigger and Redirection to CSRM Module

When a user initiates a remediation action by clicking “Remediate,” the request is directed to the Cloud Security Remediation Management (CSRM) module. At this point, the system gathers relevant metadata about the misconfiguration along with predefined remediation templates, such as policy pruning or user disablement. It may also prompt the user for any necessary inputs or confirmations, such as selecting an updated IAM policy, to ensure that the remediation is executed accurately and securely.

Example flow of an Overprivileged IAM User

In this example flow, an IAM user has been identified with “AdministratorAccess” permissions but is not part of the designated admin group. CIEM recognizes this as a critical issue and flags it with high severity. When the user initiates the remediation process by clicking “Remediate,” the system provides options to detach the overly permissive policy and replace it with a more restrictive policy. This can be based on actual usage patterns or predefined templates. The CSRM module then carries out the selected remediation. In the subsequent scan, the system confirms that the user’s permissions have been successfully adjusted to ensure least-privilege access.

Remediation Execution by Fixing Identity Risks

The CSRM Function Engine manages the execution of remediation actions to address identity risks. Once a remediation function is selected, it is executed using cloud-native APIs like AWS IAM or Azure AD Graph. The actions carried out may include detaching risky policies, removing unused permissions, converting users to roles for improved access control, or disabling and rotating access keys to enhance security.

Status Updated in UI and Cloud

After remediation, the Scanner conducts a follow-up scan to verify that the risky permission has been removed from the identity. Once this is confirmed, the issue status is updated to “Resolved.” The user interface (UI) is then refreshed to reflect the new status and display the corrected, healthy configuration, providing clear visibility into the successful remediation.

Get Started

After you login, choose the organization(for example, Cloud Security) and your cloud provider account from the landing page.

Next, click the App Launcher(on top of the page) and choose CIEM(Cloud Infrastructure Entitlement Management).

Login with your AWS account to access the AWS-specific views on the Cloud Infrastructure Entitlement Management(CIEM) dashboard.

See What You’re Protecting from the Dashboard

The primary action in CIEM is to get an overview of the Inactive Users, Groups, and Over-Privileged Roles, and Policies. Additionally, the system also provides insight into the excessive permissions across different categories.

Review Excessive Permission Summary Across Identity Types

Users

Helps you monitor dormant user accounts, which can be a security risk even without excessive permissions.

Inactive users in cloud entitlements refer to accounts or user identities that have access to cloud resources but have not been active, meaning they have not logged in, used, or performed any actions for a considerably long period. This inactivity can pose potential risks to the security and efficiency of your cloud environment. With Saner CIEM, users can identify inactive accounts on specific cloud platforms(AWS or Azure).
 
The dashboard view presents the count of users who have not been active and pose a security risk(for example, credential, compromise, unmonitored access attempts, and more). Additionally, the dashboard also presents unused or excessive permissions that result in privilege escalation or account compromise issues.
 
Clicking the link(arrow) navigates to the detailed contextual view providing a breakdown on the user and their associated permissions.

The User Details view provides a consolidated snapshot of an Azure user’s identity attributes and access relationships. It displays key metadata such as the User ID, Display Name, Created Date, Last Accessed Date, associated Entra Roles, RBAC Roles, and User Groups.

The main feature of the page is the User Details Graph, which visually maps the user’s linked groups, roles, and privileges. This helps administrators easily understand hierarchical access paths and inherited permissions at a glance.

The left panel lists all users and includes status icons that indicate their security state: the Hand icon represents Inactive users, the Red icon highlights users with Excessive permissions, and the Green icon identifies Active users. Click the filter button next to the Search box to display the related Unused, Excessive users.

Overall, this view helps security teams assess an individual user’s access footprint and identify potential risks efficiently.

Clicking any metadata item that contains a link(for example, Entra ID or User Groups) drills down further into another contextual view showing associated metadata such as user assignments, group details, or linked resources.

Groups

Groups in cloud entitlements refer to collections of user accounts that facilitate management of access rights and permissions in cloud environments. Saner CIEM allows for managing permissions through these Groups, which helps streamline role assignments, reduce errors, and enhance scalability.
 
The dashboard view presents the count of groups having excessive permissions in the associated cloud service.
 
Clicking the link(arrow) navigates to the detailed contextual view providing a breakdown on the group and their associated permissions.

The Group Details view provides a consolidated snapshot of an Azure user’s identity attributes and access relationships. It displays key metadata such as the Group ID, Display Name, Description, Created Date, associated Entra Policies, Entra Roles, RBAC Roles, and High Privilege Roles.

The main feature of the page is the Group Details Graph, which visually maps the group’s linked users, roles, and policies. This helps administrators easily understand hierarchical access paths and inherited permissions at a glance.

The left panel lists all groups and includes status icons that indicate their security state: the Hand icon represents Inactive groups, the Red icon highlights groups with Excessive permissions, and the Green icon identifies Active groups. Click the filter button next to the Search box to display the related Unused, Excessive groups.

Overall, this view helps security teams assess a group’s access footprint and identify potential risks efficiently.

Clicking any metadata item that contains a link (for example, User List) drills down further into another contextual view showing associated metadata such as user assignments, group details, or linked resources.

Policies

A policy establishes the rules and permissions that govern access to resources in a cloud environment. These policies are crucial for managing security, ensuring compliance, and enforcing governance within cloud infrastructure. Saner CIEM enables the management of policies that are presented in JSON format. These documents specify the actions, resources, and conditions under which permissions are granted or denied.

Clicking the link(arrow) navigates the user to the detailed view providing a providing a concise visualization of what’s described in each policy:

1) Policy Information that include:  Name, ID, ARN, Created Date, Roles, Users and Groups, Policy Type, and Evidence for Excessive Permission
2) Policy Details that include: Services, Resources, and Effect(allow or deny access to policies)
3) Policy Details Graph that shows a visual representation of the role connected with the policy

Roles

Roles in cloud entitlements outline a specific set of permissions that determine the actions a user, group, or service can perform on resources within the cloud environment. In Saner CIEM, roles are a fundamental part of identity and access management (IAM) systems. They are designed to enforce the principle of least privilege, ensuring that identities have access only to what they need to perform their tasks.
 
The dashboard block displays the number of inactive IAM (Identity Access Management) roles in your AWS account that may increase over time, making them unused or obsolete. If a role remains inactive for an extended period, it can create unnecessary access points, which could lead to authentication-based attacks.


Clicking the link(arrow) navigates to the detailed view providing a breakdown on the role and their associated permissions. Key details include:
1) Role overview with Name, ID, ARN, Created Date, Last Accessed Date, and policies that may allow high-privilege actions, etc.
2) Visual representation of the association between the role and its policies, making it easier to understand the intricate relationships between them

Determine if a Policy has Excessive Permission

Quickly Identify Policy Categories with Excessive Permissions

From the dashboard, go straight to the dashboard block Policies with Excessive Permission Based on Category and view the policy categories that Saner CIEM has automatically identified and listed as Excessive for your immediate use.

Get a Visual of the Relationships between Different Identities

With the Details Map get a visual of the relationships between a user, group, role, or service account and its entitlements, policies, and permissions in a cloud environment. This helps security teams understand how an identity can access resources and identify potential risks or policy misconfigurations.

The Details Map presents an interactive tree view of policies, permissions, services, and resources linked to each identity such as, Users, Groups, Policies, or Roles, within the AWS environment.

View any Infrastructure in CIEM by Type and Usage

Saner CIEM enables viewing by Type and Usage for any Users, Groups, Roles, or Policies that’s crucial for gaining insights into their purpose and utilization in a cloud environment.

Step 1: Launch Cloud Entitlements

After you login, select Cloud Security from the landing page. Next, click the App Launcher(on top of the page) and choose CIEM(Cloud Infrastructure Entitlement Management).

Step 2: Navigate to the Details Page to Access Type and Usage Filters

Click any block as needed from CIEM dashboard and navigate to the details page. On the left-hand side of the page, use the filters to narrow down your search.

Step 3: Use the Filters to Narrow Down Your Search

Click the Filter button on the side pane and combine filters to narrow down your results.

Filtering Options Available for the Different Identities:

IdentityFilter Options
UsersUnused, Excessive
GroupsUnused, Excessive
PoliciesPolicy Status, Policy Type, Permission Categories (Excessive)
RolesRole Status, Role Type, Permission Categories

Know the Infrastructure Usage Across Different Users, Groups, Policies, and Roles

Knowing “Usage”, amounts to knowing the “Risk”. The Usage data in CIEM helps identify identities with excessive or unused privileges. Searching by independent criteria or combining the filters help narrow down the search for focussed results.

As an example, the following video shows the infrastructure usage for different users.

Use Evidence to Address Policies with Excessive Permission

When reviewing a policy, use the “Evidence for Excessive Permission” that pinpoints unnecessary permissions in AWS IAM policies and helps you understand and address excessive permission.

Step 1: Launch Cloud Entitlements

After you login, select Cloud Security from the landing page. Next, click the App Launcher(on top of the page) and choose CIEM(Cloud Infrastructure Entitlement Management).

Step 2: Access the Evidence for Excessive Permission Popup
  1. From the CIEM dashboard, click the “Policies” block to open the detailed statistics page
  2. From the left-hand-side, filter by Permission Categories(Excessive). This lists all the policies that have excessive permissions.
  3. Click the Evidence for Excessive Permission icon and analyze the information from the pop-up
Step 3: Analyze the Evidence Information
  1. Look at the “Reference Path” to understand where in the policy structure the excessive permission is defined
  2. Review the “Response” to identify the action that may be unnecessarily allowed or denied
Evidence PathStructured representation of the policy’s JSON document, highlighting where the permission is defined. For example, “Policies.PolicyVersionList.Document.Action” refers to the Action field in the policy’s Document structure where permissions like “s3:ReplicateDelete” are specified.
ResponseSpecific permission or action evaluated for excessive access. For example, ” s3:ReplicateDelete” indicates a permission related to s3 bucket replication.

Know the Excessive Permissions on a Specific Service

Excessive permissions in cloud security occur when users or applications have more access than necessary to perform their tasks.

For instance, actions like deleting an S3 bucket or terminating an EC2 instance are considered high-privilege actions and are typically not granted to everyone with access to the AWS account. Instead, these permissions are reserved for a select few individuals, such as administrators or site owners. When managing these high-privilege actions among team members, there is a risk that a team member who is expected to have only read-only access may inadvertently be granted permissions to perform high-privilege actions. In this case, that team member is said to have excessive permissions.

This poses significant security risks, as it allows insiders to exploit permissions or for hackers to take control through phishing attacks.

Click here to learn more about the Excessive Permission Categories evaluated across the different cloud services.

Step 1: Launch Cloud Entitlements

After you login, select Cloud Security from the landing page. Next, click the App Launcher(on top of the page) and choose CIEM(Cloud Infrastructure Entitlement Management).

Step 2: Access the Infrastructure for Which You Want to Review Excessive Permissions

From the CIEM dashboard, click on any of the Identity blocks(user/role/group/policy) to open the additional details page.

Step 3: Access the Details Map to View the Requisite Service

Severity Status to Prioritize Misconfiguration

Any misconfigurations identified, are flagged and assigned severity status to help prioritize them.

Initiate Remediation for Different Identities from CIEM

Overview

By identifying overly permissive roles, unused accounts, and insecure policies, Saner CIEM helps organizations proactively reduce their cloud attack surface. It supports revoking unnecessary permissions, bulk removal of unused entitlements through remediation actions, or enforcing security best practices.

Step1: Initiate the Patching Task

From the Recommended Remediation block on the dashboard, click the icon (displayed as a wrench).

Step2: Select the Relevant Tab to Apply Patching Tasks
  • Predefined: Displays all fixes that use default values. Choose the relevant fixes and proceed with remediation.
  • Custom: Shows user-defined fixes, allowing you to modify the fixes before applying them.
  • All: Displays a combination of both predefined and custom fixes. You can select from the entire range of fixes available and proceed with remediation.
Step3: Automatic Redirection to CSRM

Clicking the fix icon automatically redirects you to CSRM with the CIEM module opened, allowing you to directly create the patching task using guided remediation.

Step4: Follow the Guided Remediation Steps

Go through the guided remediation for selecting and applying the necessary patches.

Address Critical Activities Using Evidence

In Cloud Infrastructure Entitlement Management (CIEM), critical activities refer to high-risk identity and access operations that significantly impacts cloud security if misused. These activities include privilege escalation (such as attaching Administrator Access), modifying or disabling IAM policies, creating access keys or service tokens, and accessing sensitive services like S3, KMS, or Secrets Manager.

What are the Recommended Critical Events to Monitor?

Click here for a detailed list of critical events with description and security implication.

What are the High-Privilege Actions in AWS?

Click here to read more about which actions are considered high-privilege in Critical Activity Logs in AWS and more.

Step 1: Launch Cloud Entitlements

After you login, select Cloud Security from the landing page. Next, click the App Launcher(on top of the page) and choose CIEM(Cloud Infrastructure Entitlement Management).

Step 2: Access the Critical Activities

A quick look at what the columns represent:

ColumnWhat it conveys?
Event NameSpecific action or operation performed(for example, createuser/deleteinstance/updatepolicy). The details provide security teams with a clear understanding of what occured during the logged in event and enables focus on critical operations.
Event CategoryCategorized the type of event(for example, authentication/access control/data access/configuration) that helps identify and prioritize events based on security relevance. For example, access control change might call for immediate review.
ResourcesSpecific cloud resources affected by the action such as EC2/S3/Database/Virtual Machines. Provides insight into the assets targeted/accessed/modified. Critical for tracking the potential impact of the event in cloud environment
ARNUnique identifier for resources in cloud platform like AWS. Enables precise identification of affected resources involved in an incident.
Performed ByIdentity(user/role/service) responsible for initiating the event. Identifies who/what triggered the action
Event TimeTime stamp of when the event occured. Critical to analyze sequence of events during incidents.
TimestampThe specific time and context of when a high-risk identity or access operation took place. Critical to analyze sequence of events during incidents.
EvidenceVerifiable evidence, such as logs, timestamps, activity traces, or event metadata, confirming that a critical identity-related activity occurred in the cloud environment.
Step 3: What Do You See In the Evidence?

Click the icon under the Evidence column in the Critical Activities block to view the evidence information.

Step 4: See the Total Count of Resources with Critical Activities

Under the “Resources” column, just go ahead and click on the count to see the resources and types.

Step 5: Filter with Specific Search Criteria for Analysis

Users have an additional capability to filter critical activity logs with specific search criteria. From the search box within the Critical Activities block, key in your search criteria to retrieve the relevant information. Analyze the information for troubleshooting or subsequent action.

Step 6: Filter with Specific Search Criteria for Analysis

Users have an additional capability to filter critical activity logs with specific search criteria. From the search box within the Critical Activities block, key in your search criteria to retrieve the relevant information. Analyze the information for troubleshooting or subsequent action.

See the Active Version for an IAM Policy

Overview

Excessive permissions can lead to unauthorized access, data breaches, or misuse of resources, so identifying them is critical. Saner CIEM helps identify excessive permissions and ensures your resources are only accessible by those who need them, reducing security risks.

Step 1: Launch Cloud Entitlements

After you login, select Cloud Security from the landing page. Next, click the App Launcher(on top of the page) and choose CIEM(Cloud Infrastructure Entitlement Management).

Step 2: Access the IAM Policy for Which You Want to See the Active Version

From the CIEM dashboard, click the Policies block and navigate to the Details page that displays the specific version(Active Version) of an IAM policy that is currently in effect for the user, group, or role to which the policy is attached.

Step 3: View the Active Version of the IAM Policy

By default, the first version of a policy is the active version when the policy is created. Subsequent versions are inactive until explicitly set as active from the appropriate cloud provider.

Commonly Asked Questions

Commonly Asked Questions
What are inactive users in the context of cloud entitlements?

Inactive users, in the context of cloud entitlements, refer to accounts or identities in your cloud environment that meet the following criteria:

— They have not engaged in any activities, such as accessing resources or executing tasks.

— They have not logged in or authenticated within a specified time frame.

How do I identify inactive users?

The dashboard view — Users — presents the count of IAM (Identity Access Management) users who have not been active and pose a security risk. Clicking the link navigates to the detailed view providing a breakdown on the user and their associated AWS permissions.

Key details include:
1) User Information with Name, ID, ARN, Created date, Last accessed date, Inline policies, Custom Managed policies, User groups, and High privilege policies
2) Policy details with Name, Association link to the user, ARN, Services, Resources, and Effect(allow or deny access to users)
3) Policy Details Graph displaying a visual representation of the user connected with the policy

What actions should I take for inactive users?

For inactive accounts, you can take the following recommended actions:

1. Implement Temporary Suspension Policies: Automatically deactivate accounts after a specified period of inactivity.

2. Disable Accounts to prevent further usage while you investigate whether the accounts are still relevant.

3. Revoke Permissions to remove access to sensitive resources to protect information.

4. Delete Accounts to permanently remove accounts that are no longer necessary.

What is Cloud Infrastructure Entitlement Management (CIEM) and why is it important?

Cloud Infrastructure Entitlement Management (CIEM) is a specialized security practice focused on managing and securing access to cloud resources by controlling entitlements — permissions, roles, and privileges assigned to users, groups, applications, and services. With Saner CIEM, users can enforce least privilege access across the AWS or Azure environment.

How do I monitor newly granted and decremented Excessive permission for my cloud Users, Groups, Policies and Roles, from Dashboard?

The Evidence for Excessive Permission that can be accessed from the detailed statistics page from any view in the CIEM dashboard provides information on the Excessive permission across Users, Groups, Roles, or Policies.

How do I check recent identity-based activities in my cloud infra that I should be concerned about?

Look into the Critical activity logs for cloud entitlements that capture important events related to identity and access management (IAM), resource permissions, and user or service activities within a cloud environment. In Saner CIEM, these critical activity logs are vital for ensuring security, compliance, and visibility into the actions performed by users, groups, roles, and services. By using these logs, users can monitor events and take prompt action to mitigate risks, enforce compliance, and improve operational efficiency.

How do I find CIEM rule that is most critical but also mostly broken?

You can find these rules in the “All Findings” table, which shows any broken rules along with the maximum number of affected resources in the “Affected Resources” column. The rule’s criticality can be determined by its Severity, also listed in the same table.

How do I get detailed analysis of Users, Groups, Policies and Roles with Excessive permission?

The Evidence for Excessive Permission that can be accessed from the detailed statistics page from any view in the CIEM dashboard provides information on the Excessive permission across Users, Groups, Roles, or Policies.

How do I know why Saner Cloud has marked a CIEM Policy as Excessive one?

When reviewing a policy , use the “Evidence for Excessive Permission” that pinpoints unnecessary permissions in AWS IAM policies and helps you understand and address excessive permission.

Access the Evidence for Excessive Permission popup from the detailed statistics page for a policy. To interpret the information:

1) Look at the “Reference Path” to understand where in the policy structure the excessive permission is defined
2) Review the “Response” to identify the action that may be unnecessarily allowed or denied

— Reference Path is the structured representation of the policy’s JSON document, highlighting where the permission is defined. For example, “Policies.PolicyVersionList.Document.Action” refers to the Action field in the policy’s Document structure where permissions like “s3:ReplicateDelete” are specified.

— Response is the specific permission or action evaluated for excessive access. For example,
“s3:ReplicateDelete” indicates a permission related to s3 bucket replication.

I want to know the increase in count for excessive permissions by date? How can I get that?

After each scan, the increased count displays in the CIEM dashboard. Just hover over the different identities(users/groups/roles/policies) to see the updated count since the last scan date.

How can I view policies by “Type” and “Usage” for any identity(User/Group/Role/Policy)?

You can filter policies based on the following categories from the Detailed statistics page:

— All: Displays all policies irrespective of type or status

— Excessive: Shows policies that have excessive permissions, meaning they grant more access than necessary.

— Unused: Lists policies that are attached but haven’t been used for any action or resource access in a specified period.

— Inline: Highlights policies that are directly embedded within a user, group, or role rather than being standalone entities.

— Managed Policies: Focuses on standalone policies, either customer-managed or AWS-managed.

I want to see a combination of “Unused Inline Policies” or “Excessive Permissions in Managed Policies”. How can I do that?

Navigate to the Detailed Statistics page for a policy by clicking on the Policy block in the dashboard. Within the Policy Details page, from the Filter drop-down list on the side pane, combine filters to narrow down your results.

For example, select the following combination within a policy:

Managed + Excessive: Displays excessive permissions in managed policies

Inline + Unused: Displays unused inline policies

How do I determine if a policy is considered to have excessive permission?

When reviewing a policy , use the “Evidence for Excessive Permission” that pinpoints unnecessary permissions in AWS IAM policies and helps you understand and address excessive permission.

Access the Evidence for Excessive Permission popup from the detailed statistics page for a policy. To interpret the information:

1) Look at the “Reference Path” to understand where in the policy structure the excessive permission is defined
2) Review the “Response” to identify the action that may be unnecessarily allowed or denied

— Reference Path is the structured representation of the policy’s JSON document, highlighting where the permission is defined. For example, “Policies.PolicyVersionList.Document.Action” refers to the Action field in the policy’s Document structure where permissions like “s3:ReplicateDelete” are specified.

— Response is the specific permission or action evaluated for excessive access. For example, ” s3:ReplicateDelete” indicates a permission related to s3 bucket replication.

I want to know the difference between an “Allow” and a “Deny” Effect?

By default, AWS denies all actions unless explicitly allowed.

— Deny: Explicitly blocks access, overriding any “Allow” permissions.

— Allow: Grants access to specified actions and resources.

I want to know what is ARN and its role in policies?

ARN stands for “Amazon Resource Name”, a unique identifier for AWS resources. Policies use ARNs to specify resources. Example: arn:aws:s3:::my-bucket

How can I view or manage different versions of a policy or configuration associated with an identity (such as a user, role, or group)?

Within the Identity details page, the “Version” drop-down allows users to switch between different versions of a policy to review changes over time or compare settings.

Where can I find the Active Version for an IAM policy?

From the CIEM dashboard, click the Policy block and navigate to the Details page that displays the specific version(Active Version) of an IAM policy that is currently in effect for the identity (such as a user, group, or role) to which the policy is attached.
By default, the first version of a policy is the active version when the policy is created. Subsequent versions are inactive until explicitly set as active.

How do I get to know the excessive permission on a specific bucket?

From the Identity details page, you can search by one of the following in the Policy Details section:
1) Amazon Resource Name(ARN)
2) Cloud service provider(for example, AWS)
3) Resource Type(for example, IAM)
4) Unique Account ID where the resource resides(for example, 438664686704)
5) Resource Path that contains the specific IAM group(for example, CIEM_Test_Group)

I want to view policies, permissions, and services linked to each identity. Where can I get this from?

Within the Identity details page, the Policy Details Map presents an interactive tree view of policies, permissions, services, and resources linked to each User, Group, or Role within the AWS environment.

For quick analysis of events, I need vital piece of information. Where can I get it from?

Saner CIEM dashboard provides Critical Activity Logs that contain information about Events, Request details, User identity, Additional user context, Resource information and more. Users have an additional capability to filter critical activity logs with specific search criteria.

How do I proceed with remediation or fixes for the findings?

From Saner CIEM dashboard, click the Fix icon pertaining to a finding for guidance or recommended steps for resolving the issue.

I want to quickly analyze the identities based on complete and current information of findings. How does Saner CIEM enable me to do this?

You can directly view the breakdown of findings from the All Findings block in Saner CIEM dashboard. Alternatively, you can export the findings to a CSV spreadsheet, select the necessary identities and findings and proceed with the remediation.

How is the principle of least privilege applied in Saner CIEM?

By default, AWS denies all actions unless explicitly allowed. Within the Policy Details section for an identity, you’ll find the options applied for a resource.

— Allow: Grants access to specified actions and resources.

— Deny: Explicitly blocks access, overriding any “Allow” permissions.

I’d like to analyze if the access is effective enough? How do I do that?

Within the Identity details page, the Policy Details Map presents an interactive tree view of policies, permissions, services, and resources linked to each User, Group, or Role within the AWS environment and helps organizations and teams to determine who has access to what. By analyzing the effective permissions from this inbuilt topographic map of identities and their access across, users can mitigate unauthorized access.

I want to understand the key capability of Saner CIEM

The centralized dashboard in Saner CIEM helps businesses surveil and manage cloud entitlements and privilege policies. With enhanced visibility organizations can eliminate redundant, dormant, or overprivileged identities.

What key challenges can I overcome with Saner CIEM?

Saner CIEM helps identify Over-permissive access and ensure users and services have only minimum required privileges.

What do I utilize for surveillance and managing cloud entitlements?

Saner CIEM provides “Identity” that denotes a user, group, or role with permissions assigned to access cloud resources and helps in surveillance and managing cloud entitlements.

How can I utilize policies to govern access and permissions in cloud environment?

Policies contain a set of rules and configurations that you can leverage to govern access and permissions in the cloud environment.

How to Know the Excessive Permissions on a Specific Bucket?

Click to read about the excessive permissions on a specific bucket or service.

Share This Article :

  • X
  • LinkedIn
Still stuck? How can we help?

Saner Documentation Feedback

Cloud Security Remediation Management(CSRM) User GuideCloud Security Posture Anomaly(CSPA) User Guide
Table of Contents
  • Real-World Scenario of Over-Permissioned Developer Role in AWS
  • What’s Involved in Detecting and Fixing Excessively Authorized Accounts?
  • Get Started
  • See What You’re Protecting from the Dashboard
  • Review Excessive Permission Summary Across Identity Types
  • Determine if a Policy has Excessive Permission
  • Get a Visual of the Relationships between Different Identities
  • View any Infrastructure in CIEM by Type and Usage
  • Know the Infrastructure Usage Across Different Users, Groups, Policies, and Roles
  • Use Evidence to Address Policies with Excessive Permission
    • Know the Excessive Permissions on a Specific Service
  • Severity Status to Prioritize Misconfiguration
  • Initiate Remediation for Different Identities from CIEM
  • Address Critical Activities Using Evidence
  • See the Active Version for an IAM Policy
  • Commonly Asked Questions
Copyright 2025 - SecPod. All Rights Reserved. Privacy Policy.
SanerNow Version 6.5.x