Skip to main content
After Cloudnosys completes a scan of your cloud resources, you’ll receive detailed results that help you understand your security posture and identify areas for improvement. This guide explains how to interpret and act on these results.

Overview of Scan Results

Result Categories

Cloudnosys categorizes scan results into several key areas:
  • Security Findings: Specific security issues and vulnerabilities
  • Compliance Status: Adherence to security frameworks and standards
  • Resource Inventory: Complete list of scanned resources
  • Risk Assessment: Overall risk level and priority recommendations

Severity Levels

Findings are classified by severity level: 🔴 Critical Immediate Action Required: Security issues that pose immediate risk Examples: Exposed databases, compromised credentials, critical vulnerabilities Response Time: Address within 24 hours 🟠 High Urgent Attention: Significant security issues that should be addressed quickly Examples: Misconfigured security groups, overly permissive IAM roles Response Time: Address within 1 week 🟡 Medium Important: Security issues that should be addressed in a reasonable timeframe Examples: Outdated software, minor configuration issues Response Time: Address within 1 month 🟢 Low Recommendations: Best practice recommendations and minor improvements Examples: Documentation updates, minor configuration optimizations Response Time: Address when convenient

Understanding the Dashboard

Main Dashboard View

The Cloudnosys dashboard provides a comprehensive overview of your security posture: Security Score
  • Overall Score: Numerical representation of your security posture
  • Trend Analysis: Changes in security score over time
  • Benchmarking: Comparison with industry standards
Critical Issues Summary
  • Issue Count: Number of critical security issues
  • Resource Impact: Which resources are affected
  • Remediation Status: Progress on fixing issues
Compliance Status
  • Framework Compliance: Adherence to security frameworks (CIS, ISO, SOC 2)
  • Compliance Score: Percentage of compliance requirements met
  • Gap Analysis: Areas where compliance is lacking

Detailed Findings View

Finding Details

Each finding includes:
  • Description: Clear explanation of the security issue
  • Impact: Potential consequences of the issue
  • Affected Resources: Which resources are impacted
  • Remediation Steps: Step-by-step instructions to fix the issue
  • References: Links to relevant documentation and best practices

Resource-Specific View

  • Resource Details: Information about the affected resource
  • Configuration: Current configuration settings
  • Security Status: Current security posture of the resource
  • Recommendations: Specific recommendations for improvement

Interpreting Security Findings

Common Security Issues

Access Control Issues
  • Overly Permissive IAM Roles: Roles with excessive permissions
  • Public Resource Access: Resources accessible from the internet
  • Weak Authentication: Insufficient authentication requirements
  • Privilege Escalation: Potential for unauthorized privilege escalation
Network Security Issues
  • Open Security Groups: Security groups allowing unrestricted access
  • Exposed Services: Services accessible from unauthorized networks
  • Weak Encryption: Unencrypted data transmission or storage
  • Network Segmentation: Insufficient network isolation
Data Protection Issues
  • Unencrypted Storage: Data stored without encryption
  • Weak Encryption Keys: Insufficient key management practices
  • Data Exposure: Sensitive data accessible to unauthorized users
  • Backup Security: Insecure backup storage and access
Compliance Issues
  • Framework Violations: Deviations from security frameworks
  • Policy Violations: Violations of organizational security policies
  • Regulatory Non-compliance: Failure to meet regulatory requirements
  • Audit Trail Issues: Insufficient logging and monitoring

Understanding Risk Levels

Risk Assessment Factors

  • Exploitability: How easily the issue can be exploited
  • Impact: Potential damage if exploited
  • Likelihood: Probability of exploitation
  • Context: Environmental factors affecting risk

Risk Calculation

Risk = Impact × Likelihood × Exploitability

Risk Mitigation

  • Immediate Actions: Steps to reduce immediate risk
  • Long-term Solutions: Comprehensive fixes for security issues
  • Monitoring: Ongoing monitoring to prevent recurrence
  • Documentation: Recording of actions taken and lessons learned

Acting on Scan Results

Immediate Actions

Critical Issues
  • Assess Impact: Determine the scope and impact of critical issues
  • Implement Fixes: Apply immediate security fixes
  • Monitor: Continuously monitor for signs of exploitation
  • Document: Record all actions taken and their effectiveness
High Priority Issues
  • Plan Remediation: Develop a plan to address high-priority issues
  • Allocate Resources: Assign appropriate resources to fix issues
  • Set Deadlines: Establish realistic timelines for remediation
  • Track Progress: Monitor progress toward resolution

Remediation Process

Step 1: Prioritize Issues
  • Risk Assessment: Evaluate the risk level of each issue
  • Resource Allocation: Determine resources needed for remediation
  • Timeline Planning: Establish realistic timelines for fixes
  • Stakeholder Communication: Inform relevant stakeholders
Step 2: Implement Fixes
  • Technical Implementation: Apply technical fixes to security issues
  • Configuration Changes: Update configurations to improve security
  • Access Controls: Implement proper access controls
  • Monitoring: Set up monitoring for fixed issues
Step 3: Verify Fixes
  • Re-scanning: Run additional scans to verify fixes
  • Testing: Test that fixes work as expected
  • Documentation: Document the fixes implemented
  • Training: Train team members on new security measures
Step 4: Monitor and Maintain
  • Continuous Monitoring: Ongoing monitoring of security posture
  • Regular Scans: Scheduled scans to detect new issues
  • Policy Updates: Regular updates to security policies
  • Team Training: Ongoing security training for team members

Advanced Features

Real-time Monitoring (Advanced Package)

EagleEye Integration
  • Threat Detection: Real-time detection of security threats
  • Anomaly Detection: Identification of unusual activities
  • Incident Response: Automated response to security incidents
  • Alert Management: Comprehensive alert management system
CloudXray Integration
  • Vulnerability Scanning: Continuous scanning for vulnerabilities
  • Malware Detection: Real-time malware detection
  • Container Security: Security scanning of container images
  • OS Security: Operating system security monitoring

Compliance Reporting

Framework Compliance
  • CIS Benchmarks: Compliance with Center for Internet Security benchmarks
  • ISO 27001: Adherence to ISO 27001 security standards
  • SOC 2: Compliance with SOC 2 requirements
  • Custom Frameworks: Support for custom compliance frameworks
Compliance Reports
  • Executive Summary: High-level compliance status
  • Detailed Reports: Comprehensive compliance analysis
  • Gap Analysis: Identification of compliance gaps
  • Remediation Plans: Plans to address compliance issues

Best Practices

Regular Review Process

  • Weekly Reviews: Regular review of scan results
  • Monthly Assessments: Monthly security posture assessments
  • Quarterly Reports: Quarterly security reports for stakeholders
  • Annual Audits: Annual comprehensive security audits

Team Collaboration

  • Role Assignment: Assign specific roles for security management
  • Communication: Regular communication about security issues
  • Training: Ongoing training on security best practices
  • Documentation: Comprehensive documentation of security processes

Continuous Improvement

  • Trend Analysis: Analysis of security trends over time
  • Process Optimization: Continuous optimization of security processes
  • Tool Updates: Regular updates to security tools and processes
  • Knowledge Sharing: Sharing knowledge and best practices

Troubleshooting

Common Issues

Scan Failures

  • Permission Issues: Insufficient permissions for scanning
  • Network Issues: Network connectivity problems
  • Resource Access: Inability to access certain resources
  • Service Limits: Cloud service limits exceeded

Result Interpretation

  • False Positives: Incorrect identification of security issues
  • False Negatives: Missed security issues
  • Context Understanding: Difficulty understanding security context
  • Remediation Guidance: Insufficient guidance for remediation

Getting Help

  • Documentation: Review Cloudnosys documentation for guidance
  • Support Team: Contact support for technical assistance
  • Community: Join the Cloudnosys community for peer support
  • Training: Attend training sessions for advanced features

Conclusion

Understanding scan results is crucial for maintaining a strong security posture. By properly interpreting results, prioritizing issues, and implementing effective remediation strategies, you can significantly improve your cloud security and compliance posture. Regular review of scan results, combined with proactive security measures, will help you stay ahead of potential security threats and maintain compliance with industry standards.