Relevant users
|
User Role
|
Can Access
|
|
Technical Team member
|
![]() |
|
DevOps Team member
|
![]() |
|
Security Analyst
|
![]() |
|
Security Engineer
|
![]() |
|
Compliance Manager
|
![]() |
|
Project Manager
|
![]() |
|
Security Team Management
|
![]() |
|
Consultant
|
![]() |
Examples
- I want to automatically close any S3 buckets which are accidentally made public.
- I want to ensure my organisation's IAM access keys are not exposed by automatically taking corrective action if an exposed key is found.
- I want to ensure my organisation always uses Server Side Encryption (SSE) for any resources receiving incoming data.
Trend Micro Cloud One™ – Conformity Solution
Step 1. Determine the account(s) where you want auto-remediation actions to occur.
Step 2. Follow auto-remediation installation instructions to setup auto-remediation on
your AWS account(s).
TipTurn on Conformity’s Real-Time Monitoring (RTM) to utilise auto-remediation in near real-time. More info on RTM.
|
Step 3. Define the event(s) you would like auto-remediated and configure the
function for the event(s) using the auto-remediation documentation.
Once auto-remediation is setup and configured, auto-remediation actions will be triggered
after your configured rule failures after each Conformity bot run. For RTM rules, auto-remediation will occur within a 2 minute interval.

