Cybersecurity › Cloud Security
Config Management
25 ControlsConfiguration Management
Ensure cloud resources are configured according to security policies.
- Use Cloud Security Posture Management (CSPM) tools like AWS Config or Azure Policy
- Implement auto-remediation for critical misconfigurations (e.g., closing public SSH ports)
- Deploy infrastructure as code (Terraform, CloudFormation) with integrated security scanning