Platform
Plerion Platform
Medium Risk
Top risks
Hacking
Attack paths
Edit Property
Kubernetes misconfigurations
Bullet List
Asset inventory
Search in Browser
Misconfigurations
Brake Warning
Vulnerabilities
Find iPhone
Breach detection
Name Tag
Permissions
Data Protection
Data security
Code
Code security
Conference
Compliance
Index
Software composition
Explore the platform →
Integrations →Supported clouds →Use cases →
Pleri AI
Happy Cloud
Meet Pleri
Neuroscience Experiment
Pleri skills & capabilities
Storytelling
Pleri docs
Customers
Resources
Microscope
Blog
Bookmark
Cloud knowledge base
Platform Documentation
Platform Documentation
Api Reference
API Reference
Company
Business Building
About
Briefcase
Careers
Chat
Contact
People
Partnerships
Secure
Trust Center
Pricing
  • Home
  • Pleri AI Icon Rounded Chevron Dark - BRIX Templates
    Pleri skills & capabilitiesPleri docs
  • Customers
  • Platform
    Icon Rounded Chevron Dark - BRIX Templates
    Top risksKuberenets misconfigurationsAsset InventoryMisconfigurationsVulnerabilitiesPermissionsBreach DetectionData SecurityCode securityComplianceSoftware Composition
    Explore The Platform
  • Use Cases
    Icon Rounded Chevron Dark - BRIX Templates
    Find & prioritize vulnerabilitiesIdentify the 1% of risk that mattersUnderstand what's in your cloudKnow who has access to whatWork where you already work
  • Resources
    Icon Rounded Chevron Dark - BRIX Templates
    BlogCloud knowledge basePlatform DocumentationAPI Reference
  • Company
    Icon Rounded Chevron Dark - BRIX Templates
    About usCareersContact usTrust center
  • Pricing
Circled Menu
Circled Menu
Get a demoSign up
Icon Rounded Padlock Accent - BRIX Templates
Sign in
Cloud knowledge base
Explainers

Explainers

Learn the basics of IAM, encryption, and key management
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Explainers

Cloud security monitoring essentials

Set up effective monitoring and alerting for security events
Explainers

AWS Organizations and account structure

Design secure multi-account architectures for enterprise scale
Explainers

Security groups vs network ACLs

Understand the differences and when to use each network control
Explainers

Encryption at rest and in transit

Protect your data with comprehensive encryption strategies
Explainers

Multi-factor authentication implementation

Step-by-step guide implementing MFA across your organization
Explainers

Introduction to zero trust archetecture

Explore the principles of never trust, always verify security model
Explainers

Common AWS misconfigurations to avoid

Identify and fix the most critical security misconfigurations
Explainers

CloudTrail configuration best practices

Essential logging configurations for comprehensive audit trails
Explainers

What is cloud security posture management (CSPM)?

Understand how CSPM tools help identify and remediate cloud misconfigurations
Explainers

Understanding IAM roles and policies

Learn how to implement least privilege access with IAM best practices
1
of
2
Page
Back to Cloud knowledge base

Cloud security monitoring essentials

Set up effective monitoring and alerting for security events

AWS Organizations and account structure

Design secure multi-account architectures for enterprise scale

Security groups vs network ACLs

Understand the differences and when to use each network control

Encryption at rest and in transit

Protect your data with comprehensive encryption strategies

Multi-factor authentication implementation

Step-by-step guide implementing MFA across your organization

Introduction to zero trust archetecture

Explore the principles of never trust, always verify security model

Common AWS misconfigurations to avoid

Identify and fix the most critical security misconfigurations

CloudTrail configuration best practices

Essential logging configurations for comprehensive audit trails

What is cloud security posture management (CSPM)?

Understand how CSPM tools help identify and remediate cloud misconfigurations

Understanding IAM roles and policies

Learn how to implement least privilege access with IAM best practices