Skip to content
SecPod  – Documentation
  • Docs Home
  • Categories
    • Saner Platform
    • Saner Cloud
    • Saner CVEM
    • Security Intelligence
  • More
    • About SecPod
    • Blog
    • Security & Privacy
    • Support Center
    • Resources
  • SCHEDULE A DEMO
  • Toggle website search
Search this website
Menu Close
  • Docs Home
  • Categories
    • Saner Platform
    • Saner Cloud
    • Saner CVEM
    • Security Intelligence
  • More
    • About SecPod
    • Blog
    • Security & Privacy
    • Support Center
    • Resources
  • SCHEDULE A DEMO
  • Toggle website search
  • Docs Home
  • Categories
    • Saner Platform
    • Saner Cloud
    • Saner CVEM
    • Security Intelligence
  • More
    • About SecPod
    • Blog
    • Security & Privacy
    • Support Center
    • Resources
  • SCHEDULE A DEMO

Saner Platform

  • Saner Platform Release Notes
    • Release Notes Saner 6.4.1
    • Release Notes SanerNow 6.4
    • Release Notes SanerNow 6.3.1
    • Release Notes SanerNow 6.3
    • Release Notes SanerNow 6.2.1
    • Release Notes SanerNow 6.2.0.3
    • Release Notes SanerNow 6.2.0.1
    • Release Notes SanerNow 6.2
    • Release Notes SanerNow 6.1.1
    • Release Notes SanerNow 6.1
    • Release Notes SanerNow 6.0
    • Release Notes SanerNow 5.3.1
    • Release Notes SanerNow 5.3
    • Release Notes SanerNow 5.2
    • Release Notes SanerNow 5.1
    • Release Notes SanerNow 5.0
    • Release Notes SanerNow 4.8.0.0
    • Release Notes SanerNow 4.7.0.0
    • Release Notes SanerNow 4.6.0.0
    • Release Notes SanerNow 4.5.0.0
    • Release Notes SanerNow 4.4.0.0
    • Release Notes SanerNow 4.3.0.0
    • Release Notes SanerNow 4.2.2.1
    • Release Notes SanerNow 4.2.2.0
    • Release Notes SanerNow 4.2.1.0
    • Release Notes SanerNow 4.2.0.0
    • Release Notes SanerNow 4.1.1.0
    • Release Notes SanerNow 4.0.0.5
  • Saner Platform Guide
    • Saner Platform Function Guides
    • Saner Device Management User Guide
  • FAQs
    • Saner CVEM Technical FAQs
  • How Tos
    • General
      • How to increase the subscription count for an Account in Saner CVEM
      • How to increment license count for an Organization in Saner CVEM
      • How to provision Saner tools for an Organization
      • How to change subscription type in Saner CVEM
      • How to sign-up with Saner CVEM?
      • How to create a new account in Saner CVEM?
      • How to create a new user in Saner CVEM?
      • How to enable SSO authentication policy in Saner CVEM?
      • How to set alerts in SanerNow?
      • How to view, download and filter the audit logs?
      • How to designate Saner Agent to perform network scan?
      • How to Co-Brand with your logo?
      • How to fetch the details of the mandatory fields from the Okta account?
      • How to create MFA policy for Okta?
      • How to fetch the details of the mandatory fields from the PingID account?
      • How to create MFA policy for PingID?
      • How to fetch the details of the mandatory fields from the PingOne account?
      • How to create MFA policy for PingOne?
      • How to download and install Saner Agent in Mac?
      • How to download and install Saner agent in Linux?
      • How to download and install the Saner agent in Windows?
      • How to update the expiry date of an existing subscription?
      • How to manage users and their preferences using role-based access?
      • How to uninstall SanerNow Agent using SanerNow Offline deployer tool.
      • How to onboard a new organization?
      • How to deploy SanerNow Agent using SanerNow Offline deployer tool.
      • How to install a Saner agent through the command line?
      • How to uninstall the Saner agent through command line?
    • Saner Reports
      • How to configure mail settings to email Report PDF?
      • How to create a custom report in SanerNow?
      • How to schedule for the report back up?
    • Saner Device Management
      • How to create custom groups in Saner CVEM
    • Saner Mail Settings
      • How to create new mail settings in Saner?
      • How to use OAuth-enabled authentication in Saner mail settings
      • How to create OAuth Client ID and Client Secret for Gmail
      • How to create OAuth Client ID and Client Secret for Microsoft 365.
  • Supported OSs and Platforms
    • Operating Systems and Platforms Supported
    • Supported Third-party Applications for Patching

Saner Cloud

  • Before You Begin
    • Glossary of Terms
    • Read me First
  • Get Started
    • Saner Cloud Deployment Guides
      • Azure Onboarding
      • Troubleshooting
      • Get Started with Saner CNAPP AWS Cloud Deployment V1.0
      • Onboarding with AWS Credentials(Least Recommended Method)
      • Onboarding with AWS Role(Manual)
      • Onboarding with AWS Role CloudFormation (Automatic): Recommended
    • Roles and Permissions
      • Roles and Permissions for AWS Remediation Access
      • Roles and Permissions for Azure Onboarding, Detection, and Remediation
  • Learn About
    • Excessive Permission Categories Evaluated Across Different Cloud Services
    • Publicly Accessible Resources
    • Patch Aging and Patch Impact
    • SecPod Default Benchmarks
    • Watchlists
    • Cloud Workload Protection Platform(CWPP)
    • Overview of Report Views in Saner Cloud
    • Whitelisting Resources
    • Saner Plasma AI Assistant for Seamless User Interaction
    • Critical Events to Monitor in AWS
    • High-Privilege Actions in Critical Activity Logs for AWS
    • Audit Logs in Saner Cloud
    • Excessive Permissions
    • Alerts in SanerCloud
  • User Guides
    • Cloud Security Remediation Management(CSRM) User Guide
    • Cloud Infrastructure Entitlement Management(CIEM) User Guide
    • Cloud Security Posture Anomaly(CSPA) User Guide
    • Cloud Security Asset Exposure(CSAE) User Guide
    • Cloud Security Posture Management(CSPM) User Guide
  • Tell Me How
    • How to Configure Automation Rule to Remediate Misconfigurations?
    • How to Manage Report Views at Organization-level in Saner Cloud?
    • How to Get a Cohesive View from Saner Cloud Unified Dashboard?
    • How to Use Tags to Quickly Filter Resources?
    • How to Troubleshoot Issues with Audit Logs?
    • How to Manage Groups and Tags in Saner Cloud?
    • How to Manage Report Views for a User Account in Saner Cloud?
    • How to Troubleshoot or Analyze with Critical Activity Logs?
    • How to Setup Alerts Across SanerCloud Tools?
    • How to Take Action on Alert Notifications from SanerCloud?
    • CSAE
      • How to Setup Watchlist Configuration for a Resource?
      • How to Identify Outdated Resources for Cleanup?
      • How does Resource Categorization Work in Saner CSAE?
      • How to Identify Resources Exposed to External Network?
      • How to Understand the Resource Footprint Globally Across Various Regions?
      • How to Make Informed Decisions on Your Expenditure based on Resource Usage Graph?
    • CSPM
      • How to Setup Benchmarks in Saner CSPM?
      • How to Use Quick Evaluation Benchmarks?
      • How to Detect Patterns over a Period with Resource Trends?
      • How to Assess System Compliance and Security Posture?
    • CSPA
      • How to Initiate Patch Remediation from CSPA Dashboard?
      • How to Quickly Identify the Detected and Remediated Anomalies for an Account?
      • How to Prioritize Remediation or Fixes based on Confidence Levels?
      • How to Examine the Overall Anomaly Information for Specific Rules or Checks?
      • How to Search and Retrieve Anomaly Data?
      • How to Whitelist Rules or Resources in Cloud Security Scans?
    • CIEM
      • How to See the Active Version for an IAM Policy?
      • How to Troubleshoot or Analyze with Critical Activity Logs?
      • How to View by Type and Usage for any Identity in CIEM?
      • How to Get Visibility into Cloud Entitlements?
      • How to Use Evidence to Address Policies with Excessive Permission?
      • How to Know the Excessive Permissions on a Specific Service?
      • How to Visually See the Relationship between Identity, Entitlement, Policy, or Permission?
      • How to Determine if a Policy has Excessive Permission?
      • How to Initiate Patch Remediation from CIEM Dashboard?
    • CSRM
      • How to Configure Automation Rule to Remediate Misconfigurations?
      • How to Create a Patching Task for Items Currently in “Approval Pending” State?
      • How to Evaluate Remediation Effort with Patching Impact Chart?
      • How to Prioritize and Address Older or High-Risk Anomalies with Patch Aging?
      • How to Monitor the Overall Status of the Remediation Job?
      • How do I Get to Know the Regions Impacted by a Specific Rule?
      • How to View the Severity of a Missing Patch Affected by a Rule?
      • How to Address Missing Patches Via Remediation Tasks?
      • How to Quickly Access the Necessary Tool for Remediation and Begin Patching Tasks?
  • Frequently Asked Questions
    • Saner Cloud Technical FAQs
  • Saner Cloud Release Notes
    • Saner Cloud – V.1.1 Release Notes
    • Saner Cloud – V.1.0 Release Notes
  • Security Intelligence for Saner Cloud
    • Infrastructure Entitlement Checks in AWS and Azure
      • Implementing Infrastructure Entitlement Checks in Azure
      • Implementing Infrastructure Entitlement Checks in AWS
    • Posture Anomaly Checks in AWS and Azure
      • Implementing Posture Anomaly Checks in AWS
      • Implementing Posture Anomaly Checks in Azure
    • Benchmark Compliance Rules in AWS and Azure
      • AWS
        • Implementing SecPod Default Rules in AWS
          • Implementing SecPod Global Rules in AWS
          • Implementing SecPod Regional Rules in AWS
        • PCI DSS 3.2.1 Rules in AWS
          • Understand SOC2 Regional Rules in Azure
          • Introduction
          • Understand PCI DSS 3.2.1 Global Rules in AWS
          • Understand PCI DSS 3.2. 1 Regional in AWS
        • CIS 3.0.0 and 4.0.0 Rules in AWS
          • Introduction
          • Understand CIS 3.0.0 Global Rules in AWS
          • Understand CIS 4.0.0 Global Rules in AWS
          • Understand CIS 3.0.0 Regional Rules in AWS
          • Understand CIS 4.0.0 Regional Rules in AWS
        • SOC
          • Implementing SOC 2 Regional Rules in AWS
          • Implementing SOC 2 Global Rules in AWS
        • Implementing HIPAA HITRUST Rules
          • Implementing HIPAA HITRUST Global Rules in AWS
          • Implementing HIPAA HITRRUST Regional Rules in AWS
        • NIST 800-53 Revision 5 Rules in AWS
          • Introduction
          • Understand NIST 800-53 revision 5 Global Rules in AWS
          • Understand NIST 800-53 revision 5 Regional Rules in AWS
      • Azure
        • CIS Rules in Azure
          • Understand CIS 1.1.0 Benchmark Compliance Rules in Azure
          • Understand CIS 3.0.0 Benchmark Compliance Rules in Azure
          • Understand CIS 1.2.0 Global Benchmark Compliance Rules in Azure
          • Understand CIS 2.1.0 Global Benchmark Compliance Rules in Azure
          • Understand CIS 3.0.0 Global Benchmark Compliance Rules in Azure
          • Understand CIS 2.0.0 Regional Benchmark Compliance Rules in Azure
          • Understand CIS 2.1.0 Regional Benchmark Compliance Rules in Azure
          • Understand CIS 3.0.0 Regional Benchmark Compliance Rules in Azure
        • NIST 800-53 Revision Rules in Azure
          • Understand NIST 800-53 Revision 5 Rules in Azure
          • Understand NIST 800-53 Revision 5 Global Rules in Azure
          • Understand NIST 800-53 Revision 5 Regional Rules in Azure
        • SecPod Rules in Azure
          • Understand SecPod Global Rules in Azure
          • Understand SecPod Regional Rules in Azure
          • Understand SecPod Default Rules in Azure
        • HIPAA HITRUST Rules in Azure
          • Understand HIPAA HITRUST 14.7.0 Rules in Azure
          • Understand HIPAA HITRUST 14.7.0 Global Rules in Azure
          • Understand HIPAA HITRUST 14.7.0 Regional Rules in Azure
        • PCI DSS Rules in Azure
          • Understand PCI DSS 4.0 Rules in Azure
          • Understand PCI DSS 4.0 Global Rules in Azure
          • Understand PCI DSS 4.0 Regional Rules in Azure
        • SOC Rules in Azure
          • Understand SOC2 Rules in Azure
          • Understand SOC2 Global Rules in Azure
          • Understand SOC2 Regional Rules in Azure

Saner CVEM

  • Saner CVEM Release Notes
    • Release Notes Saner 6.4.1
    • Release Notes SanerNow 6.4
    • Release Notes SanerNow 6.3.1
    • Release Notes SanerNow 6.3
    • Release Notes SanerNow 6.2.1
    • Release Notes SanerNow 6.2.0.3
    • Release Notes SanerNow 6.2.0.1
    • Release Notes SanerNow 6.2
    • Release Notes SanerNow 6.1.1
    • Release Notes SanerNow 6.1
    • SanerNow Risk Prioritization Launch
    • Release Notes SanerNow 6.0
    • Release Notes SanerNow 5.3.1
    • Release Notes SanerNow 5.3
    • Release Notes SanerNow 5.2
    • Release Notes SanerNow 5.1
    • Release Notes SanerNow 5.0
    • Release Notes SanerNow 4.8.0.0
    • Release Notes SanerNow 4.7.0.0
    • Release Notes SanerNow 4.6.0.0
    • Release Notes SanerNow 4.5.0.0
    • Release Notes SanerNow 4.4.0.0
    • Release Notes SanerNow 4.3.0.0
    • Release Notes SanerNow 4.2.2.1
    • Release Notes SanerNow 4.2.2.0
    • Release Notes SanerNow 4.2.1.0
    • Release Notes SanerNow 4.2.0.0
    • Release Notes SanerNow 4.1.1.0
    • Release Notes SanerNow 4.0.0.5
  • Saner CVEM Guide
    • What’s New in Saner CVEM?
    • Getting Started with Saner CVEM
    • Pre-requisites for Saner CVEM Deployment
    • How does Saner CVEM’s deployment architecture work?
  • Saner CVEM Products
    • Overview of Saner Continuous Vulnerability and Exposure Management
    • Saner CVEM Unified Dashboard User Guide
    • Saner CVEM Asset Exposure User Guide
    • Saner CVEM Continuous Posture Anomaly Management User Guide
    • Data Points IT teams can Fetch from Saner CPAM
    • Posture Anomaly Computation Rules
    • Saner CVEM Vulnerability Management User Guide
    • Saner CVEM Compliance Management User Guide
    • Saner CVEM Risk Prioritization User Guide
    • Saner CVEM Patch Management User Guide
    • Saner CVEM Endpoint Management User Guide
    • Saner CVEM Remote Access User Guide
    • Saner CVEM Network Scanner User Guide
    • Saner CVEM Cyber Hygiene Score User Guide
  • How Tos
    • Saner AE
      • How to blacklist and whitelist applications in Saner AE?
      • How to manage asset licenses using Saner AE?
      • How to run an asset scan using Saner AE?
    • Saner CPAM
      • How to create new response in PA tool?
      • How to build your own detection and response in PA tool?
      • How to whitelist an entire PA ID?
      • How to configure Posture Anomaly tool for custom detection?
      • How to fix Anomalies from PA dashboard?
      • How to fix anomalies detected in your account from All Anomalies Page?
      • How to fix anomalies from PA Summary page?
      • How to delete PA scan preferences?
      • How to schedule PA Scans on Daily, Weekly, and Monthly basis?
      • How to launch Posture Anomaly scans?
    • Saner VM
      • How to automate and schedule vulnerability scans?
      • How to exclude vulnerabilities in Saner VM tool
      • How to manage excluded vulnerabilities in Saner VM?
      • How to remediate vulnerabilities from vulnerability management dashboard?
    • Saner CM
      • How to run a compliance scan?
      • How to custom create a security policy?
      • How to align with PCI security compliance management?
      • How to align with NIST 800-171 security compliance management?
      • How to align with NIST 800-53 security compliance management?
      • How to align with HIPAA security compliance management using Saner CM?
    • Saner PM
      • How to fix firmware in Saner?
      • How to exclude patches in Saner PM?
      • How to manage excluded patches in Saner PM?
      • How to automate patch management in Saner PM?
      • How to roll back patches in Saner PM?
      • How to specify Service Level Agreement (SLA) using Remediation SLA in Saner PM?
      • How to apply missing patches in Saner PM?
      • How to apply the most critical patches in Saner PM?
      • How to perform custom remediation for applications that require paid patches using Saner PM
      • How to check the status of patching activity?
    • Saner EM
      • How to collect all security events from Windows Events Log?
      • How to check password policy set in Windows systems?
      • How to check status of DEP in Windows systems?
      • How to check faulty Anti-Virus (AV) status in Windows systems?
      • How to check for Anti-Virus (AV) status in Windows systems?
      • How to check account lockout policy on Windows systems?
      • How to check if Bit-locker protection is OFF in Windows systems?
      • How to list all inactive users on Windows systems?
      • How to list all guest accounts in Windows systems?
      • How to list all Administrator accounts on Windows systems?
      • How to list last-logon details of users on Windows systems?
      • How to identify all users in Windows systems?
      • How to collect all services that are currently running in Windows systems?
      • How to list all Groups in Windows systems?
      • How to collect all keyboard and pointing devices connected to Windows systems?
      • How to collect all storage devices connected to Windows systems?
      • How to investigate total RAM or CPU threshold (greater than or equal to 80%) in Windows systems?
      • How to collect operating systems information in Windows?
      • How to investigate disks running out of space (<100 MB) in Windows systems?
      • How to collect and investigate disk information on Windows systems?
      • How to collect all installed patches in Windows systems?
      • How to collect all software patches that are hidden in the Windows Update server?
      • How to check the status of Windows Update Server (WSUS/SCCM)?
      • How to collect BIOS information such as serial number, version, manufacturer in Windows systems?
      • How to collect all the important missing patches in Windows systems?
      • How to check wireless security in Linux systems?
      • How to collect mounted disk information on Linux systems?
      • How to check wireless signal quality in Linux systems?
      • How to check all firewall policies on Linux systems?
      • How to collect all Dynamic Host Configuration Protocol (DHCP) information on Linux systems?
      • How to collect DNS information on Linux systems?
      • How to collect ARP entries that are created when a hostname is resolved to an IP address and then to a MAC addressing in Linux?
      • How to check wireless signal quality in Windows systems?
      • How to check wireless security in Windows systems?
      • How to collect all open ports in Windows systems?
      • How to collect all network interfaces in Windows systems?
      • How to investigate DNS cache on Windows systems?
      • How to check all firewall policies on Windows systems?
      • How to collect DNS information on Windows systems?
      • How to collect all the applications with an unknown publisher in Linux systems?
      • How to perform system tuning?
      • How to collect all software licenses in Windows systems?
      • How to identify potentially unwanted programs such as torrent downloaders or unnecessary toolbars running on Windows systems?
      • How to collect a list of applications that are started when you boot your computer?
      • How to collect all the applications with an unknown publisher in Windows systems?
      • How to collect all software licenses in Mac systems?
      • How to collect ARP entries that are created when a hostname is resolved to an IP address and then to a MAC addressing Windows?
      • How to collect all families of operating systems such as Windows, Unix, and macOS?
      • How to collect environment variables set in all operating systems?
      • How to collect all the applications with an unknown publisher in Mac systems?
      • How to delete and quarantine a file?
      • How to start and stop the processes in Saner?
      • How to block blacklisted applications in Saner?
      • How to enable/disable devices in Saner
      • How to manually import devices into Saner?
      • How to deploy software in Saner EM?
      • How to enable and disable firewall settings in Saner AE?
      • How to collect all shared resources on Windows systems?
      • How to collect all Dynamic Host Configuration Protocol (DHCP) information on Windows systems?
      • How to connect to a client machine graphically using Saner Remote Access
  • FAQs
    • Saner CVEM Technical FAQs

Security Intelligence

  • Network Scanner Product Support Matrix
  • Privilege levels for authenticated scans using Saner Network Scanner
  • Overview of Security Content and Intelligence
  • Security Content Statistics
  • Application and OS Remediation Coverage
  • Compliance Benchmark Coverage
  • List of Vulnerability to Exploit/Malware Mapping covered in Saner
  • OVAL Definitions Family-wise Distribution
  • OVAL Definitions Class-wise Distribution
  • OVAL Definitions Platform Coverage
View Categories
  • Home
  • Docs
  • Saner Cloud
  • Saner Cloud Release Notes
  • Saner Cloud – V.1.0 Release Notes

Saner Cloud – V.1.0 Release Notes

Print Friendly, PDF & Email

Saner Cloud is a comprehensive solution designed to help organizations effectively manage their cloud operations. Its key modules include asset exposure, posture management, posture anomaly detection, identity and entitlement management, and remediation management.

With meaningful dashboards that provide insights into each security domain, Saner Cloud aggregates critical information from all products, offering a unified view of the security posture across cloud assets.

Major Features and Functionalities:

1. Unified Dashboard

The Saner Cloud Unified Dashboard provides a single platform that consolidates data and insights from multiple sources into one cohesive view. It offers users a comprehensive overview of important data points following the completion of each scan.

This unified dashboard enhances the user experience by eliminating the need to switch between tools to access various data sources. Instead, all information is displayed in one location(at the organization level), enabling better decision-making, quicker responses, and increased efficiency. Users also have the option to click on relevant sections of the dashboard for additional details.

Key features of the unified dashboard include:

  • Centralized Data: It aggregates data from various tools into a single interface
  • Real-time Updates: After each scan, real-time information is displayed, providing users with up-to-date insights.
  • Visualization Tools: Charts, graphs, tables, and other visual elements make the data easier to understand and interpret.

2. Cloud Security Asset Exposure (CSAE): Identifies and analyzes cloud assets to determine exposure risks

Creating Custom Watchlists for Critical Resources

You can define Watchlists to monitor critical cloud assets. Adding resources to the Watchlist enables proactive monitoring and ensures that any changes or risks associated with these critical resources are addressed promptly.

Identifying and Securing Publicly Accessible Resources

You can quickly identify which resources actively utilize the public network interfaces, and which ones do not, aiding in security and resource management decisions. These resources can include databases, storage buckets, or compute instances.

Understanding the Resource Print Globally Across Various Regions

Gain an overview of resource distribution across AWS or Azure to monitor cloud assets and services in various geographic regions. This facilitates the identification of resource concentration and allows assessment of their security posture based on location.

Switching between Standard and JSON views for Detailed Information on Resource

CSAE provides a detailed view of each resource, including configurations, permissions, usage, and security posture. Additionally, you have an option to toggle between the Standard and JSON views by clicking the appropriate buttons within the individual resource details view.

Detecting Deprecated and Outdated Services

CSAE automatically flags deprecated services that may pose security or functionality risks, allowing teams to migrate to newer alternatives before support is discontinued.

By executing automated scans and displaying outdated resources on a user-friendly dashboard, users can:

a) Identify deprecated or unsupported resources

b) Review and prioritize resources that are no longer in use or are vulnerable

c) Remove unnecessary resources

Making Informed Decisions on Your Expenditure based on Resource Usage

Gain insights into cloud expenditure from the dedicated cost and usage dashboard view, which breaks down costs at both the service and resource levels. This allows organizations to identify high-cost areas and make informed budgeting decisions.

3. Cloud Security Posture Management (CSPM): Ensures compliance by continuously monitoring cloud configurations and security policies

Creating Tailored Benchmarks

The SecPod Default Benchmark provides a pre-configured, regulatory-compliant assessment framework aimed at streamlining risk identification and mitigation across cloud environments. The benchmark system scans resources and services against selected compliance standards on a scheduled or on-demand basis.

Identifying and Resolving Configuration Issues with Quick Evaluation Benchmarks

Saner CSPM offers fast and efficient evaluations of benchmarks, allowing organizations to quickly identify and resolve configuration issues during routine audits. This feature helps save time and ensures continuous compliance with security standards.

Detecting Patterns over a Period with Resource-Trends

The Date-Wise Affected Resources Line Trend graph tracks the status of affected resources over time, helping you monitor their progress and avoid sudden spikes in non-compliance in the future.

Assessing System Compliance and Security Posture 

Saner CSPM offers a comprehensive overview of primary benchmarks, showing their severity distribution and compliance status. You can track whether resources have passed, failed, or remain unchecked due to disabled checks or unavailable data, providing a clear understanding of your compliance posture.

4. Cloud Security Posture Anomalies (CSPA): Detects deviations and anomalies in cloud security posture

Prioritizing Remediation or Fixes based on Confidence Level

Confidence Level indicates if the system is certain in determining if a detected issue or misconfiguration poses a risk. Anomalies in Saner CSPA are categorized based on a machine learning algorithm threshold or through pre-assigned severity levels. This breakdown helps prioritize actions, ensuring that critical issues are addressed first while allocating appropriate resources to less critical ones.

You have an option to look into the Confidence Level to make informed decisions from the:

— Posture Anomaly Details view within the CSPA dashboard

— Posture Anomaly Distribution(High, Medium, and Low) on the CSPA dashboard

Identifying the Detected and Remediated Anomalies for an Account

The “All Anomalies” in Saner CSPA offers a visual representation of all the anomalies detected in the Saner Cloud account as well as the anomalies that are normalized(remediated).

Anomaly data is indicated in 2 different sections indicated by distinct color codes:

— Red: highlights critical issues that require immediate attention

— Green: provides assurance about resource categories that are not problematic and remediated

Whitelisting Rules or Resources

When certain anomalies for rules or resources no longer applicable, Saner CSPA provides you with the facility to whitelist or exclude these from the cloud security scans. Whitelisted anomalies are excluded from patching recommendations, allowing organizations to focus only on actionable security gaps.

Remediating Anomalies with a Single Click

Using the Remediation functionality within Saner CSRM, you can choose to remediate anomalies based on individual resources or apply fixes to all identified security gaps collectively. This reduces the manual effort required to secure cloud resources.

Prioritizing and Addressing Older or High-Risk Anomalies with Patch Aging

The “Patch Aging” dashboard view in Saner CSRM displays a time-based line plot that shows the correlation between the number of pending patches and their age in days, helping teams address older, high-risk vulnerabilities first.

Getting a Clear Understanding on the Patch Remediation Effort

The “Patching Impact” dashboard view in Saner CSRM plots the number of security rules fixed against the number of patches applied, offering a clear understanding of the effectiveness of remediation efforts.

5. Cloud Security Entitlements Management (CIEM): Manages identity and access entitlements to prevent unauthorized access

Visually Seeing the Relationship between Identity, Entitlement, Policy, or Permission

Saner CIEM offers a built-in Policy Details Map that provides a visual representation of the relationships between an identity (user, group, role, or service account) and its entitlements, policies, and permissions in a cloud environment. It helps security teams understand how an identity can access resources and identify potential risks or policy misconfigurations.

Using Evidence to Address Policies with Excessive Permission

When reviewing a policy, use the Evidence for Excessive Permission that pinpoints unnecessary permissions in AWS IAM policies and helps you understand and address excessive permissions.

Knowing the Excessive Permissions on a Specific Service

Excessive permissions can lead to unauthorized access, data breaches, or misuse of resources, so identifying them is critical. Saner CIEM helps identify excessive permissions and ensures your resources are only accessible by those who need them, reducing security risks.

Troubleshooting or Analyzing with Critical Activity Logs

Critical activity logs are essential for monitoring, auditing, and securing cloud environments. These logs help organizations track actions, events, detect anomalies, and ensure compliance with security and governance policies.

Saner CIEM captures key security-related actions and events that could indicate a potential threat, policy violation, or operational issue. Every column provides vital piece of context about the logged event, enabling enhanced visibility, quick analysis, incident response, and compliance.

6. Cloud Security Remediation (CSRM) Management: Automates patch distribution for CSPM, CIEM, and CSPA, ensuring vulnerabilities are quickly mitigated

Getting a Focused View of the Patch Details and Status for Each Tool

Saner CSRM allows you to quickly access the necessary tool for remediation and begin patching tasks. You can select the relevant tool: CSPM, CIEM, or CSPA(displayed as links) from the top-right of the dashboard to access the section in CSRM for remediation.

Addressing Missing Patches Via Remediation Tasks

Addressing missing patches by creating remediation tasks is crucial for maintaining the security and stability of IT infrastructure. Saner CSRM provides a wizard-based approach to creating a remediation task for the missing patches.

Prioritizing Patches Across Tools that have the Highest Security Impact

Saner CSRM helps you identify the Top 10 missing patches across CSPM, CIEM, and CSPA that have the highest security impact. Patches are ranked based on a weighted score considering severity and the number of affected resources, ensuring the most critical anomalies are addressed first.

Prioritizing and Addressing Older and High-Risk Anomalies

A time-based line plot shows the correlation between the number of pending patches and their age in days, helping teams address older, high-risk vulnerabilities first. The Patch Aging chart in Saner CSPA dashboard visually represents the duration during which patches remain unapplied in an IT environment. It illustrates the relationship between the number of pending patches and the number of days they have been outstanding.

This chart assists organizations in tracking and managing their patch deployment timelines. An upward trend indicates delays in patch deployment, which increases the organization’s exposure to vulnerabilities over an extended period. The creative visual employs characters or icons along the timeline to depict different stages of patch aging, including growth, decline, and subsequent resurgence.

Developing a Clear Understanding to Evaluate the Remediation Efforts

The Patching Impact Chart in Saner CSRM plots the number of security rules fixed against the number of patches applied, offering a clear understanding on the effectiveness of remediation efforts.

Initiating the Patch Remediation Process

You can begin the patch remediation process by following these steps in order: Finalize the job creation, Select the affected resources, Review the summary and adjust your selections as needed (this may involve skipping unnecessary patches), Enter the scheduling details, Assign a unique job name, Configure any additional options, if applicable, and Review the summary again.

At the final step of patching tasks creation, users with approval permissions can either approve the execution immediately or create a task for approval. Only approved tasks proceed to execution.

7. AI

Saner Cloud features a powerful AI assistant designed to help you quickly access information across various dashboards and categories. This functionality saves time, increases efficiency, and enhances the overall user experience by providing instant, relevant information on demand.

The AI assistant is activated by clicking the green icon within any dashboard block. This action allows the assistant to understand the context of the displayed data and summarize crucial information in a tooltip format.

Users can also pose queries across three main categories: Learn, Discover, and Saner Intelligence. It serves as a versatile tool for various use cases, whether you’re searching for general learning resources, in-depth discoveries, or advanced intelligence insights. This function acts as a central hub for interacting with the AI.

8. Alerts

Saner Cloud provides pre-built conditions for each alert that’s based on standard compliance specifications and overall security posture. Response configuration also helps you to perform patch remediation tasks as needed. Different types include:

  • Asset Exposure Alerts
  • Posture Anomaly Alerts
  • Identity Entitlement Management Alerts
  • Remediation Management Alerts

9. Reports

Saner Cloud provides the flexibility to use multiple predefined report views, known as Canned Reports, as well as the option to create Custom Report views. These report views allow you to set a specific time range or backup schedule, which is helpful for analyzing data over a designated period. Additionally, you can share these report views with others and perform various operations to enhance collaboration and analysis.

10. Tags to Search and Filter

Saner Cloud simplifies the searching and filtering of resources using tags. Instead of manually browsing through hundreds or thousands of resources, you can quickly filter relevant ones by using tags. With tags available across different tools, users can efficiently filter and retrieve specific resources in large environments.

11. Audit Logs

Each tool within Saner Cloud has its own set of unique job codes, ensuring that events occurring within a particular tool are distinctly categorized and easily traceable. This structured approach to capturing and categorizing events ensures detailed visibility into application usage, supporting effective auditing and troubleshooting.

Share This Article :
  • X
  • LinkedIn
Still stuck? How can we help?

Saner Documentation Feedback

Saner Cloud – V.1.1 Release Notes
Table of Contents
  • Major Features and Functionalities:
  • 8. Alerts
  • 9. Reports
  • 11. Audit Logs
Copyright 2025 - SecPod. All Rights Reserved. Privacy Policy.
SanerNow Version 6.3.x