Skip to main content

cspm

Cloud Security Posture Management (CSPM)

The CSPM domain within Kscope KDefend provides continuous monitoring and analysis of your cloud infrastructure security posture across AWS, Azure, and GCP. It detects misconfigurations, IAM risks, network exposure, and compliance violations by correlating data from cloud Blueprints through the context graph.


How It Works

Cloud Blueprints

  • AWS
  • Azure
  • GCP
  • Kubernetes

Context Graph

  • Topology & Relationships
  • Enrichment Pipeline

CSPM Analyzers

  • IAM Analysis
  • Compute Security
  • Network Exposure
  • Streaming Security

Insight Feeds

  1. Cloud Blueprints ingest infrastructure metadata — IAM policies, compute instances, network configurations, security groups — using read-only credentials
  2. Context Graph stores and correlates relationships across accounts, regions, and providers
  3. CSPM Analyzers detect misconfigurations, excessive permissions, and compliance violations
  4. Insight Feeds surface prioritized findings scored by business impact and exploitability

Analyzers

AnalyzerWhat it coversBlueprints
AWS IAMIAM users, roles, policies, access keys, MFA compliance, cross-account access, least privilege violationsAWS
AWS ComputeEC2 instances, ECS clusters, Lambda functions, security groups, public exposure, AMIsAWS
AWS NetworkVPCs, subnets, Route 53, load balancers, security groups, NACLs, CloudFront, API GatewayAWS
AWS StreamingKinesis streams and streaming infrastructureAWS
Azure IAMAzure AD roles and access managementAzure
Azure NetworkVNets, DNS, VPN configurations, NSGsAzure
GCP IAMService accounts, IAM roles, policy bindingsGCP
GCP ComputeCompute Engine instances and workloadsGCP
GCP NetworkVPCs, firewall rules, networking infrastructureGCP
KubernetesCluster state, nodes, pods, RBAC, network policies, container securityKubernetes
Azure StreamingAzure streaming and event infrastructure securityAzure

What It Detects

Identity & Access Risks

  • IAM users with console access but no MFA enabled
  • Roles with admin access or wildcard resource permissions
  • Unused access keys, unrotated credentials
  • Cross-account role trust misconfigurations
  • Service accounts with excessive permissions

Network Exposure

  • Security groups allowing unrestricted inbound access
  • Public subnets with risky NACLs
  • Publicly accessible EC2 instances without justification
  • VPCs without private subnets
  • Load balancers with insecure configurations

Compute Misconfigurations

  • EC2 instances exposing non-public S3 buckets
  • Lambda functions with deprecated runtimes
  • ECS clusters with insufficient security configurations
  • Unused key pairs and detached elastic IPs

Compliance Posture

  • CIS Benchmark violations for AWS, Azure, and GCP
  • Drift from organizational security policies
  • Password policies not meeting security standards

Key Metrics

MetricDescription
Total Cloud AssetsNumber of monitored cloud resources across all providers
Critical MisconfigurationsCount of high-severity configuration violations
IAM Risk ScoreComposite score reflecting identity and access exposure
Network Exposure ScoreMeasure of publicly accessible attack surface
Compliance CoveragePercentage of assets meeting defined security benchmarks
CSPM Security Risk ScoreComposite 0–100 score dynamically weighted across all active CSPM analyzers. Only analyzers with a configured blueprint contribute to the score.

  • ASPM — Application security findings may correlate with cloud misconfigurations (e.g., a vulnerable app deployed on a publicly exposed EC2 instance)
  • DSPM — IAM policies granting excessive access to storage and databases connect cloud identity risks to data exposure