Platform
Plerion Platform
Top risks
Attack paths
Kubernetes misconfigurations
Asset inventory
Misconfigurations
Vulnerabilities
Breach detection
Permissions
Data security
Code security
Compliance
Software composition
Explore the platform →
Integrations →
Supported clouds →
Use cases →
Pleri AI
Meet Pleri
Pleri skills & capabilities
Pleri docs
Customers
Resources
Blog
Cloud knowledge base
Platform Documentation
API Reference
Company
About
Careers
Contact
Partnerships
Trust Center
Pricing
Home
Pleri AI
Pleri skills & capabilities
Pleri docs
Customers
Platform
Top risks
Kuberenets misconfigurations
Asset Inventory
Misconfigurations
Vulnerabilities
Permissions
Breach Detection
Data Security
Code security
Compliance
Software Composition
Explore The Platform
Use Cases
Find & prioritize vulnerabilities
Identify the 1% of risk that matters
Understand what's in your cloud
Know who has access to what
Work where you already work
Resources
Blog
Cloud knowledge base
Platform Documentation
API Reference
Company
About us
Careers
Contact us
Trust center
Pricing
Get a demo
Sign up
Sign in
Cloud knowledge base
Explainers
Explainers
Learn the basics of IAM, encryption, and key management
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Explainers
Cloud security monitoring essentials
Set up effective monitoring and alerting for security events
Explainers
AWS Organizations and account structure
Design secure multi-account architectures for enterprise scale
Explainers
Security groups vs network ACLs
Understand the differences and when to use each network control
Explainers
Encryption at rest and in transit
Protect your data with comprehensive encryption strategies
Explainers
Multi-factor authentication implementation
Step-by-step guide implementing MFA across your organization
Explainers
Introduction to zero trust archetecture
Explore the principles of never trust, always verify security model
Explainers
Common AWS misconfigurations to avoid
Identify and fix the most critical security misconfigurations
Explainers
CloudTrail configuration best practices
Essential logging configurations for comprehensive audit trails
Explainers
What is cloud security posture management (CSPM)?
Understand how CSPM tools help identify and remediate cloud misconfigurations
Explainers
Understanding IAM roles and policies
Learn how to implement least privilege access with IAM best practices
1
of
2
Page
Back to Cloud knowledge base
Cloud security monitoring essentials
Set up effective monitoring and alerting for security events
AWS Organizations and account structure
Design secure multi-account architectures for enterprise scale
Security groups vs network ACLs
Understand the differences and when to use each network control
Encryption at rest and in transit
Protect your data with comprehensive encryption strategies
Multi-factor authentication implementation
Step-by-step guide implementing MFA across your organization
Introduction to zero trust archetecture
Explore the principles of never trust, always verify security model
Common AWS misconfigurations to avoid
Identify and fix the most critical security misconfigurations
CloudTrail configuration best practices
Essential logging configurations for comprehensive audit trails
What is cloud security posture management (CSPM)?
Understand how CSPM tools help identify and remediate cloud misconfigurations
Understanding IAM roles and policies
Learn how to implement least privilege access with IAM best practices