CloudSploit compliance scans work by defining the security controls required by the program and then mapping CloudSploit plugins to that control. For example, the PCI control that requires the use of encryption would be mapped to numerous CloudSploit plugins that check for the use of encryption across cloud services. The PCI compliance report then summarizes the results of these plugins under the encryption control.
How do CloudSploit compliance reports work? Print
Created by: Matt Fuller
Modified on: Sun, 10 Nov, 2019 at 12:00 PM
Did you find it helpful?Send feedback
Sorry we couldn't be helpful. Help us improve this article with your feedback.