Conformity offers an extensive set of Security rules and tools to monitor activity
on your Cloud infrastructure, manage, and remediate potential security vulnerabilities.
Access Conformity's security tools with:
Procedure
Security Rules
Conformity supports over 150 security rules over a varied range of
severities to give your organization better visibility on your security
compliance. These rules are accessed via the Security
& Compliance package.
Additional rules that are run in real-time are accessed separately with the Real-Time Threat Monitoring add-on.
View check failures for security rules
Security Rules behave like any other Rule on the Conformity platform.
They may require rule configuration and can be viewed via the numerous Reporting tools available.
Filter report by security rules
Procedure
- Open your selected Report
- Click on Filter checks
- Check Security in Categories. _Note: Make sure other categories are unchecked
- Scroll down to the output of the check where you can **View by Rule
- Click on a Rule to see which resources have failed their check against the Rule. For more info, see Rules.