Platform
Plerion Platform
Medium Risk
Top risks
Hacking
Attack paths
Edit Property
Kubernetes misconfigurations
Bullet List
Asset inventory
Search in Browser
Misconfigurations
Brake Warning
Vulnerabilities
Find iPhone
Breach detection
Name Tag
Permissions
Data Protection
Data security
Code
Code security
Conference
Compliance
Index
Software composition
Explore the platform →
Integrations →Supported clouds →Use cases →
Pleri AI
Happy Cloud
Meet Pleri
Neuroscience Experiment
Pleri skills & capabilities
Storytelling
Pleri docs
Customers
Resources
Microscope
Blog
Bookmark
Cloud knowledge base
Platform Documentation
Platform Documentation
Api Reference
API Reference
Company
Business Building
About
Briefcase
Careers
Chat
Contact
People
Partnerships
Secure
Trust Center
Pricing
  • Home
  • Pleri AI Icon Rounded Chevron Dark - BRIX Templates
    Pleri skills & capabilitiesPleri docs
  • Customers
  • Platform
    Icon Rounded Chevron Dark - BRIX Templates
    Top risksKuberenets misconfigurationsAsset InventoryMisconfigurationsVulnerabilitiesPermissionsBreach DetectionData SecurityCode securityComplianceSoftware Composition
    Explore The Platform
  • Use Cases
    Icon Rounded Chevron Dark - BRIX Templates
    Find & prioritize vulnerabilitiesIdentify the 1% of risk that mattersUnderstand what's in your cloudKnow who has access to whatWork where you already work
  • Resources
    Icon Rounded Chevron Dark - BRIX Templates
    BlogCloud knowledge basePlatform DocumentationAPI Reference
  • Company
    Icon Rounded Chevron Dark - BRIX Templates
    About usCareersContact usTrust center
  • Pricing
Circled Menu
Circled Menu
Get a demoSign up
Icon Rounded Padlock Accent - BRIX Templates
Sign in
Cloud knowledge base
Explainers
AWS Organizations and account structure
Table of contents
Heading 2
Heading 3
Heading 4
Heading 5
Heading 6
Explainers

AWS Organizations and account structure

Table of contents
Heading 2
Heading 3
Heading 4
Heading 5
Heading 6
Back to Cloud knowledge base

Related articles

Explainers

Cloud security monitoring essentials

Set up effective monitoring and alerting for security events
Explainers

Security groups vs network ACLs

Understand the differences and when to use each network control
Explainers

Encryption at rest and in transit

Protect your data with comprehensive encryption strategies