Skip to content
SecPod  – Documentation
  • Docs Home
  • Categories
    • Saner Platform
    • Saner Cloud
    • Saner CVEM
    • Security Intelligence
  • More
    • About SecPod
    • Blog
    • Security & Privacy
    • Support Center
    • Resources
  • SCHEDULE A DEMO
  • Toggle website search
Search this website
Menu Close
  • Docs Home
  • Categories
    • Saner Platform
    • Saner Cloud
    • Saner CVEM
    • Security Intelligence
  • More
    • About SecPod
    • Blog
    • Security & Privacy
    • Support Center
    • Resources
  • SCHEDULE A DEMO
  • Toggle website search
  • Docs Home
  • Categories
    • Saner Platform
    • Saner Cloud
    • Saner CVEM
    • Security Intelligence
  • More
    • About SecPod
    • Blog
    • Security & Privacy
    • Support Center
    • Resources
  • SCHEDULE A DEMO

Saner Platform

  • Saner Platform Release Notes
    • Saner Platform Integration Release: ServiceNow Integration Introduced, Freshservice Enhanced
    • Release Notes Saner 6.4.1
    • Release Notes SanerNow 6.4
    • Release Notes SanerNow 6.3.1
    • Release Notes SanerNow 6.3
    • Release Notes SanerNow 6.2.1
    • Release Notes SanerNow 6.2.0.3
    • Release Notes SanerNow 6.2.0.1
    • Release Notes SanerNow 6.2
    • Release Notes SanerNow 6.1.1
    • Release Notes SanerNow 6.1
    • Release Notes SanerNow 6.0
    • Release Notes SanerNow 5.3.1
    • Release Notes SanerNow 5.3
    • Release Notes SanerNow 5.2
    • Release Notes SanerNow 5.1
    • Release Notes SanerNow 5.0
    • Release Notes SanerNow 4.8.0.0
    • Release Notes SanerNow 4.7.0.0
    • Release Notes SanerNow 4.6.0.0
    • Release Notes SanerNow 4.5.0.0
    • Release Notes SanerNow 4.4.0.0
    • Release Notes SanerNow 4.3.0.0
    • Release Notes SanerNow 4.2.2.1
    • Release Notes SanerNow 4.2.2.0
    • Release Notes SanerNow 4.2.1.0
    • Release Notes SanerNow 4.2.0.0
    • Release Notes SanerNow 4.1.1.0
    • Release Notes SanerNow 4.0.0.5
  • Saner Platform Guide
    • Prerequisites For Saner SaaS Platform Deployment
    • Saner Administration Guide
    • Saner Device Management User Guide
    • Saner Platform and ServiceNow Integration Guide
    • Saner Platform and Freshservice Integration Guide
    • Saner Platform Function Guides
  • FAQs
    • Saner CVEM Technical FAQs
  • How Tos
    • General
      • How to increase the subscription count for an Account in Saner CVEM
      • How to increment license count for an Organization in Saner CVEM
      • How to provision Saner tools for an Organization
      • How to change subscription type in Saner CVEM
      • How to sign-up with Saner CVEM?
      • How to create a new account in Saner CVEM?
      • How to enable SSO authentication policy in Saner CVEM?
      • How to set alerts in Saner?
      • How to view, download and filter the audit logs?
      • How to designate Saner Agent to perform network scan?
      • How to Co-Brand with your logo?
      • How to fetch the details of the mandatory fields from the Okta account?
      • How to create MFA policy for Okta?
      • How to fetch the details of the mandatory fields from the PingID account?
      • How to create MFA policy for PingID?
      • How to fetch the details of the mandatory fields from the PingOne account?
      • How to create MFA policy for PingOne?
      • How to download and install Saner Agent in Mac?
      • How to download and install Saner agent in Linux?
      • How to download and install the Saner agent in Windows?
      • How to update the expiry date of an existing subscription?
      • How to manage users and their preferences using role-based access?
      • How to uninstall Saner Agent using Saner Offline deployer tool.
      • How to onboard a new organization?
      • How to deploy Saner Agent using Saner Offline deployer tool.
      • How to install a Saner agent through the command line?
      • How to uninstall the Saner agent through command line?
    • Saner Reports
      • How to configure mail settings to email Report PDF?
      • How to create a custom report in Saner?
      • How to schedule for the report back up?
    • Saner Device Management
      • How to create custom groups in Saner CVEM
    • Saner Mail Settings
      • How to create new mail settings in Saner?
      • How to use OAuth-enabled authentication in Saner mail settings
      • How to create OAuth Client ID and Client Secret for Gmail
      • How to create OAuth Client ID and Client Secret for Microsoft 365.
  • Supported OSs and Platforms
    • Operating Systems and Platforms Supported
    • Supported Third-party Applications for Patching

Saner Cloud

  • Before You Begin
    • Glossary of Terms
    • Read me First
  • Get Started
    • Prerequisites For Saner SaaS Platform Deployment
    • Saner Cloud Deployment Guides
      • Azure Onboarding
      • Troubleshooting
      • Get Started with Saner CNAPP AWS Cloud Deployment V1.0
      • Onboarding with AWS Credentials(Least Recommended Method)
      • Onboarding with AWS Role(Manual)
      • Onboarding with AWS Role CloudFormation (Automatic): Recommended
    • Roles and Permissions
      • Roles and Permissions for AWS Remediation Access
      • Roles and Permissions for Azure Onboarding, Detection, and Remediation
  • Learn About
    • Critical Events to Monitor in GCP
    • Saner CSRP Classification Based on Scoring Decision
    • Cloud Cyber Hygiene Scoring(CCHS) Approach
    • Remediation Rollback
    • Automation and Job-driven Remediation
    • Cost and Usage
    • Excessive Permission Categories Evaluated Across Different Cloud Services
    • Publicly Accessible Resources
    • Patch Aging and Patch Impact
    • SecPod Default Benchmarks
    • Watchlists
    • Cloud Workload Protection Platform(CWPP)
    • Overview of Report Views in Saner Cloud
    • Whitelisting Resources
    • Saner Plasma AI Assistant for Seamless User Interaction
    • Critical Events to Monitor in AWS
    • High-Privilege Actions in Critical Activity Logs for AWS
    • Audit Logs in Saner Cloud
    • Excessive Permissions
    • Alerts in SanerCloud
  • User Guides
    • GCP Cloud Infrastructure Entitlement Management (CIEM) User Guide
    • Azure Cloud Infrastructure Entitlement Management(CIEM) User Guide
    • Cloud Security Risk Prioritization(CSRP) User guide
    • Cloud Cyber Hygiene Score(CCHS) User Guide
    • Cloud Security Remediation Management(CSRM) User Guide
    • AWS Cloud Infrastructure Entitlement Management(CIEM) User Guide
    • Cloud Security Posture Anomaly(CSPA) User Guide
    • Cloud Security Asset Exposure(CSAE) User Guide
    • Cloud Security Posture Management(CSPM) User Guide
  • Tell Me How
    • How to Remediate in Saner Cloud?
    • How to Configure Automation Rule to Remediate Misconfigurations?
    • How to Manage Report Views at Organization-level in Saner Cloud?
    • How to Get a Cohesive View from Saner Cloud Unified Dashboard?
    • How to Use Tags to Quickly Filter Resources?
    • How to Troubleshoot Issues with Audit Logs?
    • How to Manage Groups and Tags in Saner Cloud?
    • How to Manage Report Views for a User Account in Saner Cloud?
    • How to Troubleshoot or Analyze with Critical Activity Logs?
    • How to Setup Alerts Across SanerCloud Tools?
    • How to Take Action on Alert Notifications from SanerCloud?
    • CCHS
      • How to Monitor Resource Risk Trends for CHS?
      • How to Assess Resource Health through Severity Distribution?
      • How to Evaluate Service-Level Risks Using CHS Scores?
      • How to Analyze Cyber Hygiene Scores through Trend Chart?
      • How to Identify High-Risk Resources by Geo Location?
      • How to Get an Overview of Cyber Hygiene for Cloud Resources?
      • How to Review Organization-Level Cyber Hygiene Across Accounts?
      • How to Assess Risk Distribution for Different Cloud Providers?
      • How to Review Major Issues Contributing to the Drop of Cyber Hygiene Score at Account-Level?
      • How to Analyze Module-wise Risk through CHS Distribution?
      • How to View the Cyber Hygiene Score Distributed Across Cloud Environments?
      • How to Track Security Posture with Cyber Hygiene Score?
      • How to Configure Account Weightage?
    • CSRP
      • How to Monitor and Analyze Audit Logs for Risk Prioritization?
      • How to Configure Risk Based Cloud Security Alerts?
      • How to Generate Reports and Visualizations?
      • How to Filter Risks by Tags for Targeted Analysis?
      • How to Manage Prioritized Risks at Account-level?
      • How to View the Detailed Breakdown of a Specific Cloud Cyber Security Standard (CCSS) Risk Finding?
      • How to Review and Prioritize Resources Based on Associated Risks?
      • How to Assess Risk Distribution on Essential Resources?
      • How to Assess and Prioritize Risks Across Resource Categories?
      • How to Identify the Risks Affecting Essential Resources?
      • How to Assess Full Versus Limited Technical Impact of Exploiting an Anomaly?
      • How to Review the Risk Factor Distribution Based on Automatable Reliability?
      • How to Get an Overview of Exploitable Risks?
      • How to Map Risks to MITRE ATT&CK for Threat-Informed Defense?
      • How to Configure Questionnaire and Assess Security Practices Across Core Domains for an Account?
    • CSPM
      • How to Setup Benchmarks in Saner CSPM?
      • How to Use Quick Evaluation Benchmarks?
      • How to Detect Patterns over a Period with Resource Trends?
      • How to Assess System Compliance and Security Posture?
    • CSPA
      • How to Initiate Patch Remediation from CSPA Dashboard?
      • How to Quickly Identify the Detected and Remediated Anomalies for an Account?
      • How to Prioritize Remediation or Fixes based on Confidence Levels?
      • How to Examine the Overall Anomaly Information for Specific Rules or Checks?
      • How to Search and Retrieve Anomaly Data?
      • How to Whitelist Rules or Resources in Cloud Security Scans?
    • CIEM
      • How to See the Active Version for an IAM Policy?
      • How to Address Critical Activities Using Evidence?
      • How to View by Type and Usage for any Identity in CIEM?
      • How to Get Visibility into Cloud Entitlements?
      • How to Use Evidence to Address Policies with Excessive Permission?
      • How to Know the Excessive Permissions on a Specific Service?
      • How to Visually See the Relationship between Identity, Entitlement, Policy, or Permission?
      • How to Determine if a Policy has Excessive Permission?
      • How to Initiate Remediation for Different Identities from CIEM?
    • CSRM
      • Rollback an Applied Remediation
      • How to Configure Automation Rule to Remediate Misconfigurations?
      • How to Create a Patching Task for Items Currently in “Approval Pending” State?
      • How to Evaluate Remediation Effort with Patching Impact Chart?
      • How to Prioritize and Address Older or High-Risk Anomalies with Patch Aging?
      • How to Monitor the Overall Status of the Remediation Job?
      • How do I Get to Know the Regions Impacted by a Specific Rule?
      • How to View the Severity of a Missing Patch Affected by a Rule?
      • How to Address Missing Patches Via Remediation Tasks?
      • How to Quickly Access the Necessary Tool for Remediation and Begin Patching Tasks?
    • CSAE
      • How to Setup Watchlist Configuration for a Resource?
      • How to Identify Outdated Resources for Cleanup?
      • How does Resource Categorization Work in Saner CSAE?
      • How to Identify Resources Exposed to External Network?
      • How to Understand the Resource Footprint Globally Across Various Regions?
      • How to Make Informed Decisions on Your Expenditure based on Resource Usage Graph?
  • Frequently Asked Questions
    • Saner Cloud Technical FAQs
  • Saner Cloud Release Notes
    • Saner Cloud – V.3.0.0.0 Release Notes
    • Saner Cloud – V.2.0.0.2 Release Notes
    • Saner Cloud – V.2.0.0.1 Release Notes
    • Saner Cloud – V.2.0.0.0 Release Notes
    • Saner Cloud – V.1.2.0.1 Release Notes
    • Saner Cloud – V.1.2.0.0 Release Notes
    • Saner Cloud – V.1.1.0.0 Release Notes
    • Saner Cloud – V.1.1 Release Notes
    • Saner Cloud – V.1.0 Release Notes

Saner CVEM

  • Saner CVEM Release Notes
    • Release Notes Saner CVEM 6.6
    • Release Notes Saner 6.5
    • Saner Platform Integration Release: ServiceNow Integration Introduced, Freshservice Enhanced
    • Release Notes Saner 6.4.1
    • Release Notes SanerNow 6.4
    • Release Notes SanerNow 6.3.1
    • Release Notes SanerNow 6.3
    • Release Notes SanerNow 6.2.1
    • Release Notes SanerNow 6.2.0.3
    • Release Notes SanerNow 6.2.0.1
    • Release Notes SanerNow 6.2
    • Release Notes SanerNow 6.1.1
    • Release Notes SanerNow 6.1
    • SanerNow Risk Prioritization Launch
    • Release Notes SanerNow 6.0
    • Release Notes SanerNow 5.3.1
    • Release Notes SanerNow 5.3
    • Release Notes SanerNow 5.2
    • Release Notes SanerNow 5.1
    • Release Notes SanerNow 5.0
    • Release Notes SanerNow 4.8.0.0
    • Release Notes SanerNow 4.7.0.0
    • Release Notes SanerNow 4.6.0.0
    • Release Notes SanerNow 4.5.0.0
    • Release Notes SanerNow 4.4.0.0
    • Release Notes SanerNow 4.3.0.0
    • Release Notes SanerNow 4.2.2.1
    • Release Notes SanerNow 4.2.2.0
    • Release Notes SanerNow 4.2.1.0
    • Release Notes SanerNow 4.2.0.0
    • Release Notes SanerNow 4.1.1.0
    • Release Notes SanerNow 4.0.0.5
    • Saner CVEM
      • Release Notes Saner CVEM 6.6
  • Saner CVEM Guide
    • What’s New in Saner CVEM?
    • Getting Started with Saner CVEM
    • Pre-requisites for Saner CVEM Deployment
    • How does Saner CVEM’s deployment architecture work?
  • Saner CVEM Products
    • Overview of Saner Continuous Vulnerability and Exposure Management
    • Saner CVEM Unified Dashboard User Guide
    • Saner CVEM Asset Exposure User Guide
    • Saner CVEM Continuous Posture Anomaly Management User Guide
    • Data Points IT teams can Fetch from Saner CPAM
    • Posture Anomaly Computation Rules
    • Saner CVEM Vulnerability Management User Guide
    • Saner CVEM Compliance Management User Guide
    • Saner CVEM Risk Prioritization User Guide
    • Saner CVEM Patch Management User Guide
    • Saner CVEM Endpoint Management User Guide
    • Saner CVEM Remote Scripting User Guide
    • Saner CVEM Remote Access User Guide
    • Saner CVEM Network Scanner User Guide
    • Saner CVEM Cyber Hygiene Score User Guide
  • How Tos
    • Saner AE
      • How to blacklist and whitelist applications in Saner AE?
      • How to manage asset licenses using Saner AE?
      • How to run an asset scan using Saner AE?
    • Saner CPAM
      • How to create new response in PA tool?
      • How to build your own detection and response in PA tool?
      • How to whitelist an entire PA ID?
      • How to configure Posture Anomaly tool for custom detection?
      • How to fix Anomalies from PA dashboard?
      • How to fix anomalies detected in your account from All Anomalies Page?
      • How to fix anomalies from PA Summary page?
      • How to delete PA scan preferences?
      • How to schedule PA Scans on Daily, Weekly, and Monthly basis?
      • How to launch Posture Anomaly scans?
    • Saner CM
      • How to run a compliance scan?
      • How to custom create a security policy?
      • How to align with PCI security compliance management?
      • How to align with NIST 800-171 security compliance management?
      • How to align with NIST 800-53 security compliance management?
      • How to align with HIPAA security compliance management using Saner CM?
    • Saner VM
      • How to automate and schedule vulnerability scans?
      • How to exclude vulnerabilities in Saner VM tool
      • How to manage excluded vulnerabilities in Saner VM?
      • How to remediate vulnerabilities from vulnerability management dashboard?
    • Saner PM
      • How to fix firmware in Saner?
      • How to exclude patches in Saner PM?
      • How to manage excluded patches in Saner PM?
      • How to automate patch management in Saner PM?
      • How to roll back patches in Saner PM?
      • How to apply missing patches in Saner PM?
      • How to apply the most critical patches in Saner PM?
      • How to perform custom remediation for applications that require paid patches using Saner PM
      • How to check the status of patching activity?
    • Saner EM
      • How to collect all security events from Windows Events Log?
      • How to check password policy set in Windows systems?
      • How to check status of DEP in Windows systems?
      • How to check faulty Anti-Virus (AV) status in Windows systems?
      • How to check for Anti-Virus (AV) status in Windows systems?
      • How to check account lockout policy on Windows systems?
      • How to check if Bit-locker protection is OFF in Windows systems?
      • How to list all inactive users on Windows systems?
      • How to list all guest accounts in Windows systems?
      • How to list all Administrator accounts on Windows systems?
      • How to list last-logon details of users on Windows systems?
      • How to identify all users in Windows systems?
      • How to collect all services that are currently running in Windows systems?
      • How to list all Groups in Windows systems?
      • How to collect all keyboard and pointing devices connected to Windows systems?
      • How to collect all storage devices connected to Windows systems?
      • How to investigate total RAM or CPU threshold (greater than or equal to 80%) in Windows systems?
      • How to collect operating systems information in Windows?
      • How to investigate disks running out of space (<100 MB) in Windows systems?
      • How to collect and investigate disk information on Windows systems?
      • How to collect all installed patches in Windows systems?
      • How to collect all software patches that are hidden in the Windows Update server?
      • How to check the status of Windows Update Server (WSUS/SCCM)?
      • How to collect BIOS information such as serial number, version, manufacturer in Windows systems?
      • How to collect all the important missing patches in Windows systems?
      • How to check wireless security in Linux systems?
      • How to collect mounted disk information on Linux systems?
      • How to check wireless signal quality in Linux systems?
      • How to check all firewall policies on Linux systems?
      • How to collect all Dynamic Host Configuration Protocol (DHCP) information on Linux systems?
      • How to collect DNS information on Linux systems?
      • How to collect ARP entries that are created when a hostname is resolved to an IP address and then to a MAC addressing in Linux?
      • How to check wireless signal quality in Windows systems?
      • How to check wireless security in Windows systems?
      • How to collect all open ports in Windows systems?
      • How to collect all network interfaces in Windows systems?
      • How to investigate DNS cache on Windows systems?
      • How to check all firewall policies on Windows systems?
      • How to collect DNS information on Windows systems?
      • How to collect all the applications with an unknown publisher in Linux systems?
      • How to perform system tuning?
      • How to collect all software licenses in Windows systems?
      • How to identify potentially unwanted programs such as torrent downloaders or unnecessary toolbars running on Windows systems?
      • How to collect a list of applications that are started when you boot your computer?
      • How to collect all the applications with an unknown publisher in Windows systems?
      • How to collect all software licenses in Mac systems?
      • How to collect ARP entries that are created when a hostname is resolved to an IP address and then to a MAC addressing Windows?
      • How to collect all families of operating systems such as Windows, Unix, and macOS?
      • How to collect environment variables set in all operating systems?
      • How to collect all the applications with an unknown publisher in Mac systems?
      • How to delete and quarantine a file?
      • How to start and stop the processes in Saner?
      • How to block blacklisted applications in Saner?
      • How to enable/disable devices in Saner
      • How to manually import devices into Saner?
      • How to deploy software in Saner EM?
      • How to enable and disable firewall settings in Saner AE?
      • How to collect all shared resources on Windows systems?
      • How to collect all Dynamic Host Configuration Protocol (DHCP) information on Windows systems?
      • How to connect to a client machine graphically using Saner Remote Access
  • FAQs
    • Saner CVEM Technical FAQs

Security Intelligence for Saner CVEM

  • Overview of Security Content and Intelligence
  • Security Content Statistics
  • OVAL Definitions Platform Coverage
  • OVAL Definitions Class-wise Distribution
  • OVAL Definitions Family-wise Distribution
  • Application and OS Remediation Coverage
  • Compliance Benchmark Coverage
  • List of Vulnerability to Exploit/Malware Mapping covered in Saner
  • Network Scanner Product Support Matrix
  • Privilege levels for authenticated scans using Saner Network Scanner

Security Intelligence for Saner Cloud

  • Benchmark Compliance Rules in AWS and Azure
    • Azure
      • NIST 800-53 Revision Rules in Azure
        • NIST 800-53 Revision 5 Rules in Azure: An Overview
        • Understand NIST 800-53 Revision 5 Rules in Azure
        • Understand NIST 800-53 Revision 5 Global Rules in Azure
        • Understand NIST 800-53 Revision 5 Regional Rules in Azure
      • SecPod Rules in Azure
        • SecPod Default Rules in Azure: An Overview
        • Understand SecPod Global Rules in Azure
        • Understand SecPod Regional Rules in Azure
        • Understand SecPod Default Rules in Azure
      • HIPAA HITRUST Rules in Azure
        • HIPAA HITRUST Rules in Azure: An Overview
        • Understand HIPAA HITRUST 14.7.0 Rules in Azure
        • Understand HIPAA HITRUST 14.7.0 Global Rules in Azure
        • Understand HIPAA HITRUST 14.7.0 Regional Rules in Azure
      • PCI DSS Rules in Azure
        • PCI DSS 3.2.1 Rules in Azure: An Overview
        • Understand PCI DSS 4.0 Rules in Azure
        • Understand PCI DSS 4.0 Global Rules in Azure
        • Understand PCI DSS 4.0 Regional Rules in Azure
      • SOC 2 Rules in Azure
        • SOC 2 Rules in Azure: An Overview
        • Understand SOC2 Rules in Azure
        • Understand SOC2 Global Rules in Azure
        • Understand SOC2 Regional Rules in Azure
      • CIS Rules in Azure
        • CIS Rules in Azure: An Overview
        • Understand CIS 1.2.0 Rules in Azure
        • Understand CIS 2.1.0 Rules in Azure
        • Understand CIS 1.1.0 Benchmark Compliance Rules in Azure
        • Understand CIS 3.0.0 Benchmark Compliance Rules in Azure
        • Understand CIS 1.2.0 Global Benchmark Compliance Rules in Azure
        • Understand CIS 2.1.0 Global Benchmark Compliance Rules in Azure
        • Understand CIS 3.0.0 Global Benchmark Compliance Rules in Azure
        • Understand CIS 2.1.0 Regional Benchmark Compliance Rules in Azure
        • Understand CIS 3.0.0 Regional Benchmark Compliance Rules in Azure
    • AWS
      • SecPod Rules in AWS
        • SecPod Default Rules in AWS: An Overview
        • Understand SecPod Default Rules in AWS
        • Understand SecPod Global Rules in AWS
        • Understand SecPod Regional Rules in AWS
      • PCI DSS 3.2.1 Rules in AWS
        • PCI DSS 3.2.1 Rules in AWS: An Overview
        • Understand PCI DSS 3.2.1 Rules in AWS
        • Understand PCI DSS 3.2.1 Global Rules in AWS
        • Understand PCI DSS 3.2. 1 Regional in AWS
      • CIS Rules in AWS
        • CIS Rules in AWS: An Overview
        • Understand CIS Rules in AWS
        • Understand CIS 3.0.0 Rules in AWS
        • Understand CIS 4.0.1 Rules in AWS
        • Understand CIS 4.0.0 Rules in AWS
        • Understand CIS 3.0.0 Global Rules in AWS
        • Understand CIS 4.0.0 Global Rules in AWS
        • Understand CIS 3.0.0 Regional Rules in AWS
        • Understand CIS 4.0.0 Regional Rules in AWS
      • HIPAA HITRUST Rules in AWS
        • HIPAA HITRUST Rules in AWS: An Overview
        • Understand HIPAA HITRUST Rules in AWS
        • Understand HIPAA HITRUST Global Rules in AWS
        • Understand HIPAA HITRRUST Regional Rules in AWS
      • NIST 800-53 Revision 5 Rules in AWS
        • NIST 800-53 Revision 5 Rules in AWS: An Overview
        • Understand NIST 800-53 Revision 5 Rules in AWS
        • Understand NIST 800-53 Revision 5 Global Rules in AWS
        • Understand NIST 800-53 Revision 5 Regional Rules in AWS
      • SOC 2 Rules in AWS
        • SOC 2 Rules in AWS: An Overview
        • Understand SOC 2 Rules in AWS
        • Understand SOC 2 Global Rules in AWS
        • Understand SOC 2 Regional Rules in AWS
  • Posture Anomaly Checks in AWS and Azure
    • Implementing Posture Anomaly Checks in AWS
    • Implementing Posture Anomaly Checks in Azure
  • Infrastructure Entitlement Checks in AWS and Azure
    • Implementing Infrastructure Entitlement Checks in Azure
    • Implementing Infrastructure Entitlement Checks in AWS
View Categories
  • Home
  • Docs
  • Saner Cloud
  • User Guides
  • GCP Cloud Infrastructure Entitlement Management (CIEM) User Guide

GCP Cloud Infrastructure Entitlement Management (CIEM) User Guide

Print Friendly, PDF & Email

Google Cloud Identity and Access Management (IAM) specifies who can access various resources and the actions they are permitted to perform within the cloud environment. By assigning roles to users, groups, service accounts, and workloads at different levels, such as organization, folder, project, or resource, IAM enables centralized and detailed access control. Because IAM policies inherit permissions in a downward manner through the resource hierarchy, any misconfigurations can lead to significant security risks if not monitored continuously.

The GCP Cloud Infrastructure Entitlement Management (CIEM) capability within Saner Cloud provides a unified, data-driven view of identity and permission risks across GCP environments. This enables security teams to quickly identify excessive permissions, analyze high-risk activities, and implement guided remediation actions to enhance their cloud security posture.

The GCP CIEM dashboard provides actionable insights into the permissions assigned to users, groups, and service accounts. It also provides deep visibility into IAM policies and custom roles that might grant excessive privileges, helping teams understand who has access, how that access was granted, and the potential impact of that access on their environment.

To facilitate ongoing risk reduction, CIEM includes a Recommended Remediation view that highlights identity and resource-related risks based on their priority. This feature allows teams to concentrate on the most critical issues first. Additionally, detailed identity information and contextual metadata simplify investigations and accelerate remediation workflows.

Operational awareness is further enhanced through Critical Activity monitoring, which identifies high-risk events categorized by scope, at the organization, folder, or project level, allowing teams to focus on the most concerning areas. Each alert provides consolidated evidence such as timestamps, initiators, affected resources, and system-level traces to assist with quicker validation and incident response.

Collectively, these capabilities make GCP CIEM a centralized hub for entitlement visibility, risk analysis, and incident investigation, aiding organizations in enforcing least-privilege access and maintaining a secure cloud environment. Complementary tools like Cloud Security Risk Prioritization (CSRP) and Cloud Cyber Hygiene Score (CCHS) further enhance risk prioritization and ongoing IAM management across multi-cloud environments, including Microsoft Azure.

Follow the links to learn about the various dashboard functionalities:  

Get Started

Review Excessive Permission Summary Across Identities

Identify the Most Privileged Users for Optimization

View Excessive Permissions and Explore Contextual Details

Remediate Identity and Resource Related Risks Through Recommended Remediation

Prioritize Remediation with Severity

View Identity Lists and Explore Contextual Information

Monitor High Risk Events Through Critical Activity Alerts

Review Evidence Details for Critical Activity

Get Started

After you login, choose the organization and from the landing page, select your Saner Cloud Account to which you have onboarded your GCP cloud account.  Next, click the App Launcher(on top of the page) and choose “CIEM Cloud Infrastructure Entitlement Management”.  

Review Excessive Permission Summary Across Identity Types 

How to Use the Views? 

The views allow you to quickly assess access-related risks by highlighting areas that require your attention. Begin by identifying risk hotspots through blocks that display a high number of excessive permissions. Prioritize cleanup efforts by locating inactive, empty, or unused entities that could unnecessarily increase your attack surface. If deeper investigation is needed, expand any block to examine the specific identities, policies or roles involved. Additionally, track trends over time with numeric indicators, that help you monitor any increase or decrease in risk-prone entities. Together, these insights provide a clear starting point for determining where to focus your investigation or remediation efforts.  

Users

With Saner CIEM, you can identify users in cloud IAM that have access to cloud resources but have not been active, which means the users have not logged in, used, or performed any actions for a considerably long period.  Additionally, the dashboard also presents users with excessive permissions that could result in privilege escalation and does not fit well with Principle of Least Privilege (PoLP) of Cloud Service Providers. 

You can also see if there has been an increase or decrease in Excessive Users as part of resource Trend. 

Clicking the numbers, text or icon on the block, navigates to the detailed contextual view providing a breakdown on the Users and their associated permissions.  

The User  Details view provides a consolidated snapshot of GCP User’s identity attributes and access relationships. It displays key metadata such as the User ID, Display Name, Created Date, Last Accessed Date, associated Policies, Permissions, and User Groups.  

The main feature of the page is the User Details Graph, which visually maps the user’s linked Organizations, Projects, Permissions, Groups, Roles, and Actions. This helps administrators easily understand hierarchical access paths and inherited permissions at a glance.  

The left panel lists all users and includes status icons that indicate their security state: the Hand icon represents Inactive users, the Red  colored icon highlights users with Excessive permissions, and the Green colored  icon identifies Active users.

Click the filter button next to the Search box to display the related Unused and Excessive users.  

Clicking on the names of Entra of RBAC roles nodes assigned to the user, redirects to the detail page of the clicked Role node. 

User can either choose to expand or collapse the full graph with “Expand All button”, or they can also choose to expand each node separately. The graph can also be viewed in Vertical as well as Horizontal view, just with a click of a button. Clicking any metadata item that contains a link (for example, Entra ID or User Groups) drills down further into another contextual view showing associated metadata such as user assignments, group details, or linked resources. 

Groups

Groups in cloud entitlements refer to collections of user accounts that facilitate management of access rights and permissions in cloud environments.   

With Saner CIEM, users can identify Groups which are empty because empty groups with excessive permissions become easy target for the attackers.  

The dashboard view also presents the count of groups having excessive permissions in the associated cloud service.  

Clicking the numbers, text, or icon on the block, navigates to the detailed contextual view providing a breakdown on the group and their associated permissions.  

The Group Details view provides a consolidated snapshot of Group’s attributes and access relationships. It displays key metadata such as the Group ID, Display Name, Group Email, Users present in the Group, associated Service Accounts, Allowed as well as High Privilege Allow Policies attached to the Group. 

Additionally, the Group Details Graph also provides a visual representation of the group’s associated roles, projects, and users, enabling administrators to quickly understand hierarchical access relationships and inherited permissions at a glance. It also highlights the policy document evidence that explains why the group is identified as having excessive permissions, helping administrators investigate and remediate access risks efficiently. 

The left panel lists all groups and includes status icons that indicate their security state: the Red colored  icon highlights groups with Excessive permissions, and the Green colored  icon identifies Active groups. Click the filter button next to the Search box to display the related Empty, Excessive groups.  

Clicking on the names of Policy or Roles nodes assigned to the Group, redirects to the detail page of clicked Policy or Role node. 

User can either choose to expand or collapse the full graph with “Expand All button”, or expand each node separately. The graph can also be viewed in Vertical as well as Horizontal view, just with a click of a button. 

Clicking any metadata item that contains a link drills down further into another contextual view showing associated metadata such as user “High Privilege Allow Policies” or “Allow Policies”.  

Service Accounts

Service account in GCP is a non-human identity used by applications, workloads, or services to authenticate and access Google Cloud resources. Service accounts can be granted permissions using GCP Roles. 

Clicking the numbers, text or icon on the block, navigates to the detailed contextual view providing a breakdown on the Service Accounts and their associated permissions. 

The Service Account details view provides a comprehensive snapshot of a GCP Service Account’s identity and permission footprint. 

It displays key metadata such as the Service Account’s ID, Display Name, Email, Allowed and High Privileged allowed Policies. Clicking any metadata item that contains a link drills down further into another contextual view showing associated metadata mentioned above. 

The left panel lists all Service Accounts with associated IDs in brackets and includes status icons that indicate their security state: the Red colored icon highlights Service Account with Excessive permissions, and the Green icon identifies Service Account with no Excessive permission.  

At the centre, the Service Account Details Graph visually maps the Service Account’s elevated actions. This helps administrators easily understand hierarchical access paths and inherited permissions at a glance. Administrators can also see what is the “Evidence in Policy Document” that makes this Service Account excessive. 

You can either choose to expand or collapse the full graph with “Expand All button”, or expand each node separately. The graph can also be viewed in Vertical as well as Horizontal view, just with a click of a button. 

Policies

In GCP, an IAM policy is basically a set of rules that decides who can do what on which resources. Policies are generally attached to resources. Once attached, they control access to everything under that resource. 

Saner Cloud CIEM shows the Policies that carry Excessive Permissions and also Orphaned Bindings in Policies which means the IAM role binding that references a principal (user, group, or service account) that no longer exists. 

Clicking the numbers, text or icon on the block, navigates to the detailed contextual view providing a breakdown on the Service Accounts and their associated permissions.

It displays key metadata such as the Service Policy’s Name, Entities like Users, Groups and Service Accounts, Custom and Google Managed Roles, Policy Bindings and more. Clicking any metadata item that contains a link, drills down further into another contextual view showing associated metadata mentioned above. 

The left panel lists all Policies with associated IDs in brackets and includes status icons that indicate their security state: the Red icon highlights the Policy with Excessive permissions, and the Green colored icon identifies Policy with no Excessive permission.  

The Policy Details Graph visually maps the excessive roles that are bound to the Principals and helps administrators easily understand hierarchical access paths and inherited permissions at a glance. Administrators can also see what is the “Evidence in Policy Document” that makes this Policy excessive. 

User can either choose to expand or collapse the full graph with “Expand All button”, or expand each node separately. The graph can also be viewed in Vertical as well as Horizontal view, just with a click of a button. 

Roles

In Google Cloud Platform (GCP) Roles are collections of permissions that define what actions a principal can perform on GCP resources. Roles can be assigned to principals (users, groups, service accounts) through IAM policies. 

The total roles are collection of google roles which are attached to a principal and custom created role. CIEM also shows how many of these total roles have Excessive Permissions. Lastly, it displays Custom Created roles which are not attached to any IAM Entity.  

In the context of Saner CIEM dashboard, the Roles block provides a quick assessment of identity-level privilege risks. It highlights roles with excessive permissions, identifies unused or redundant roles, and supports the enforcement of least privilege principles. 

Clicking the numbers, text or icon on the block, navigates to the detailed contextual view providing a breakdown on the Entra Roles and their associated permissions.  

It displays key metadata such as the Custom and Google Managed Roles, Permissions that are allowed and denied, which Project it is associated with and Evidence in Policy Document. 

The left panel lists all Roles with associated IDs in brackets and includes status icons that indicate their security state: the Red colored  icon highlights the Policy with Excessive permissions, and the Green  colored icon identifies Policy with no Excessive permission.  

The Roles Details Graph visually maps the excessive roles that are bound to the Principals and helps administrators easily understand hierarchical access paths and inherited permissions at a glance. Administrators can also see what is the “Evidence in Policy Document” that makes this Role excessive. 

User can either choose to expand or collapse the full graph with “Expand All button”, or expand each node separately. The graph can also be viewed in Vertical as well as Horizontal view, just with a click of a button. 

Identify the Most Privileged Users for Optimization

Privileged users are prime targets for attackers and hence its critical to gain visibility into these accounts. This helps security teams to instantly spot high-risk accounts, IT admins to prioritize remediation(remove unused roles/groups), auditors to get clear evidence of who has elevated roles and why, incident response teams to quickly identify risky accounts, and more.  

The Top 10 Most Privileged Users dashboard block in CIEM highlights users with elevated permissions that can be optimized for security and compliance reasons.  

Here’s a closer look at what each column means:  

Username  

Display name associated to the User.  

User ID  

Unique identifier of the User. 

Excessive Permissions  

Provides the count of permissions beyond normal baseline (for example, Legacy Primitive Role, Cross Organization Access Permissions). Clicking on the count(link) displays the list of elevated permissions assigned to the user.  

Excessive Roles  

Provides the count of GCP roles that exceed job function (for example, organizationRoleAdmin, actions.Admin, editor etc). Clicking on the count(link) displays the list of elevated permissions assigned to the role.  

Excessive Groups  

Provides the groups that have exceeding permissions. Clicking on the count(link) displays the list of elevated permissions assigned to the Groups.  

Evidence  

Provides supporting data such as role assignment, evidence path, response, related references(links) to learn more details. Clicking the Evidence icon opens a pop-up from which you can analyze these excessive permission details.  

View Excessive Permissions and Explore Contextual Details 

Google Managed Roles

The Google Managed Roles with Excessive Permissions view provides a concise overview of GCP Managed Roles that assigns permissions and helps security administrators to quickly identify potential areas of risk that need deeper investigation. 

Instead of just showing “who has what role”, this view shows how risky those roles are, so that one can prioritize which issues to fix first. For example, in this case, you must fix impersonation roles first, because they enable privilege escalation. 

Legacy Primitive Role 

These are old, broad roles that were used before more granular IAM roles became standard. They are risky as they assign wide permissions, not aligned with least privilege and applies across many services. 

Primitive Role 

This category shows basic predefined roles that grant access across almost all services in a project. They are risky as they are not service-specific, may include hundreds or thousands of permissions and are common source of excessive access 

Administrative Role 

Roles in this category are designed to manage specific services or infrastructure. These are flagged because they allow creation/modification/deletion of resources, may allow IAM policy changes and could enable infrastructure takeover.

Dangerous Role 

These are the roles that include permissions commonly used in Privilege escalation, Policy modification, and Security control bypass.

Impersonation Role 

These roles allow a user or service account to act as another service account and can also lead to Privilege escalation and Lateral movement. 

Clicking on any count in the block opens a detailed Information page for the selected role category. This page allows for further exploration through metadata links, allowing you to access deeper layers of related role and permission data. This helps administrators quickly identify Google Managed Roles assignments that may pose security risks due to elevated, privileged, or overly broad access.  

Custom Roles 

The Custom Roles in GCP are user-defined IAM roles that contain a custom set of permissions selected by your organization. They help you create your own role with only the exact permissions required. Saner Cloud CIEM categorises these custom roles so that you can prioritize which issues to fix first.

High Risk Permissions 

Roles under this category can directly lead to Privilege escalation, can modify IAM policy, can bypass Security control and lead to full project takeover. 

Administrative Permissions 

Permissions that allow managing, modifying, or deleting resources within a service. These permissions don’t necessarily escalate privileges, but they allow full control of services. 

Cross Project Access Permissions 

These are the permissions that allow a principal to access or modify resources across multiple projects. They are risky because they increase the blast radius in case of an attack and are harder to contain during incident response. 

Cross Organization Access Permissions 

These permissions allow access beyond your GCP organization boundary. It is hard to monitor external misuse, and they can increase supply-chain attack surface. 

Wildcard Permissions 

These are the permissions granted using wildcards (*) that allow broad actions. They are risky as they grant future permissions automatically, making it hard to audit exact scope and are often unintentionally over-privileged. 

Invalid or Deprecated Permissions 

Permission that either no longer exist, deprecated by Google, not valid in custom roles or tied to retired services that fall under this category.  

Clicking on any count in the block opens a detailed Information page for the selected role category. This page allows for further exploration through metadata links, allowing you to access deeper layers of related role and permission data. This helps administrators quickly identify Google Managed Roles assignments that may pose security risks due to elevated, privileged, or overly broad access.  

Remediate Identity and Resource Related Risks Through Recommended Remediation

The Recommended Remediation view in the GCP Cloud CIEM(Cloud Infrastructure Entitlement Management) dashboard provides security teams with a centralized way to identify and address identity and resource risks. It highlights issues such as inactive Users, Service Accounts and Groups, Empty groups, Projects that do not have any owners, misconfigured and excessive roles, offering a prioritized list of remediation actions. 

From this view, administrators can directly initiate remediation steps, which automatically redirect to CSRM (Cloud Security Resource Management) for tasks such as patching, privilege correction, or role modification workflows. This streamlines identity governance and enforces secure access across GCP environments.  

Open the Saner Cloud CIEM dashboard and go straight down to the “Recommended Remediation” view. Your page displays entries such as inactive Users, Service Accounts and Groups, Empty groups and misconfigured and Excessive roles etc, similar to the items shown in the screenshot. 

Every finding includes the following details for which you understand the impact and priority. 

  • ID: Unique Identifier for the finding  
  • Title: Descriptive heading for the finding 
  • Description: Explains why this identity is a risk  
  • Identity Type: Indicates if the identity belongs to Users, Groups, Projects, Service Account etc. 
  • Identities: Indicates the count of associated identities 
  • Severity: Indicates the criticality of the Risk 
  • Fix: Clickable button to proceed with remediation  

Here are some examples of remediations that the system allows: 

Empty Groups: Remove group or reduce its assigned roles 

Inactive User: Disable or delete account 

Overly permissive Identity: Reduce permissions or remove Identity 

Click the Fix icon (wrench symbol). The panel opens allowing you to: 

  • View the affected GCP identities 
  • Validate impact before remediation 
  • Select identities for bulk removal or modification 

Once you have selected the identities, click Proceed. The system automatically redirects you to CSRM, where: 

  • A remediation task is created 
  • Permissions/roles/groups are modified 
  • Inactive identities are deactivated or removed 

Finalize the remediation by confirming the changes. The update is then reflected back in the CSRM dashboard. 

Prioritize Remediation with Severity

Any misconfigurations identified, are flagged and assigned severity status to help Administrator prioritize them. 

View Identity Lists and Explore Contextual Information 

The Recommended Remediation view allows you to explore the identities or resources linked to each finding. This feature allows you to quickly identify the users, groups, service accounts, or roles that are affected. You can also review their detailed metadata, permissions, and the relationship graph. This information helps security teams to validate  risks, understand access paths, and make informed decisions about remediation. 

In the pop-up window, browse the list of identities and click on any identity name to open its Additional Details page. 

At the top of this page, review the metadata header that helps you understand the identity’s details, creation history, assigned Permissions and Policies, relationship with other identities and so on. Note that the metadata header varies per the identity selected. 

From the left-hand-side pane, click the filter button next to the Search box to display the related Inactive, Excessive resources. 

Monitor High Risk Events Through Critical Activity Alerts 

Critical Activities refer to high-impact and high-risk actions performed by users, service Accounts, or automated processes. Examples of critical activities include abnormal or risky sign-ins, failed authentication attempts, role assignments, privilege escalations, deletion or modification of sensitive resources, identity configuration changes, and access policy updates.  

Saner CIEM(Cloud Infrastructure Entitlement Management) helps monitor High-Risk Events through Scope Specific Critical Activity Alerts dashboard views. These views provide continuous visibility into sensitive authentication attempts and high-impact operational actions across the cloud environment. The detailed evidence views present initiator information, location data, impacted resources, and event outcomes, that help analysts efficiently investigate alerts, validate legitimacy, and take corrective actions.  

Saner Cloud uses the GCP API to retrieve sign-in events and audit logs from the cloud service provider, displaying them on the CIEM Dashboard separated by Scope based tabs such as Organization, Folder and Project.

Risk Detection Type  Description 
Anonymous IP address Detects login attempts originating from known anonymizing proxy IP addresses, such as Tor exit nodes. 
Reference: Event Threat Detection overview 
Unfamiliar sign-in properties Flags login activity that deviates from a user’s learned baseline, such as new devices or locations. 
Reference: Cloud Audit Logs – Log types 
Sensitive Service Enablement Detects the activation of high-risk APIs (e.g., Compute, BigQuery) that increase the project’s attack surface and billing exposure. 
Reference: Enabled services – Calling the API 
Service Account Key Creation Tracks the generation of new service account keys, a common technique used by attackers to maintain persistent access outside the console. 
Reference: Create and delete service account keys 
Resource Path Mapping Shows the exact project and resource being modified (for example: projects/dev-gcp/…), providing clear “Where” context for the activity. 
Reference: Cloud resource hierarchy 
Administrative Identity Tracking Identifies the specific actor (for example: [email protected]) responsible for the change, establishing “Who” made the modification. 
Reference: IAM access overview 
Service-Specific Risk Monitors changes to serviceusage.googleapis.com, the gateway service for enabling other Google Cloud features. Changes here represent a structural shift in project capabilities. 
Reference: Enable or disable services 
Audit Actions Regularly 

Ensure the following actions are logged and reviewed periodically: 

Restrict Permissions 

Use the principle of least privilege, granting access to these actions only to trusted, high-level users or service roles. 

Enable Multi-Factor Authentication (MFA) 

Require MFA for users with permissions to perform these actions. 

Use Resource Policies 

Set resource-based policies to add an extra layer of control. 

Tag Governance 

Maintain a tagging strategy and monitor un-tagging actions. 

Note that Saner Cloud only displays Activities that are flagged as “Risky” by GCP to keep you focused on the important events. 

Saner Cloud uses GCP API to fetch the events and display them in Critical Activities section on CIEM Dashboard categorised into scope-based sections.  

Each column provides specific insight, from identifying the event through its unique Event Name, Event Category, Who performed this activity, Resource ID, Service name, IP, timestamps, and the supporting evidence behind each alert, allowing effective monitoring, investigation, and response to potential identity-based threats.  

Column Description
Event Name Shows the name of the user account involved in the activity.
Event Category Category under which the Service that performed the Activity falls.
Performed ByEntity who performed the activity. 
Resources Indicates the resource which was affected by this activity. 
Service Name Service which was used by the entity to perform the activity.
IP AddressDisplays the public IP address from which the event originated, allowing for geolocation checks, suspicious network detection, and anomaly investigation. 
Event Time Shows the exact timestamp of when the event occurred, helping in timeline reconstruction and forensic analysis. 
Evidence The Evidence panel for Critical Activity Alerts provides a snapshot of all the details related to the event. This includes the event’s timestamp, unique IDs, and alert type. Key request information is highlighted, such as the client application used, the user’s IP address, and event characteristics like Operation and user agent.

Review Evidence Details for Critical Activity 

Evidence in the Critical Activity view provides comprehensive details about any important events at different scopes/levels like Organization, Folder and Project. It consolidates essential information, including Event Name, Event Category, Performed By, Resources, Service Name, IP Address, Event Time, Evidence. 

Follow the steps below to review evidence details for a GCP Critical Activity alert: 

From the Critical Activity “Sign-In Alert” tab, click the Evidence icon specific to an Event Name. 

Below is an example of an event caused by IAM service falling under the IAM & Policy category at the Scope Organization. 

Review the timestamp, unique event Name, Event Method and which resource was affected by this event. 

Get to know the entity which has performed the activity. 

Look at the Action Performed which could be granting permission to a resource or modification of resource properties. 

Assess the geographic details derived from the IP address, how the operation was authorized and if the authorization was valid or not. 

Here is one more example of an event caused by bigquery.googleapis.com falling under the Data Management category at the Scope Project. 

Review the timestamp, unique event Name, Event Method and the resource affected by this event. 

Get to know the entity that has performed the activity and the method used to perform it. 

Look at the Action Performed which could be permission to an operation and if it was granted or denied. 

Assess the geographic details derived from the IP address, how the operation was authorized and if the authorization was valid or not. 

Share This Article :

  • X
  • LinkedIn
Still stuck? How can we help?

Saner Documentation Feedback

Azure Cloud Infrastructure Entitlement Management(CIEM) User Guide
Table of Contents
  • Get Started
  • Review Excessive Permission Summary Across Identity Types 
  • Identify the Most Privileged Users for Optimization
  • View Excessive Permissions and Explore Contextual Details 
  • Remediate Identity and Resource Related Risks Through Recommended Remediation
  • Prioritize Remediation with Severity
  • View Identity Lists and Explore Contextual Information 
  • Monitor High Risk Events Through Critical Activity Alerts 
  • Review Evidence Details for Critical Activity 
Copyright 2026 - SecPod. All Rights Reserved. Privacy Policy.
SanerNow Version 6.5.x