Using cloud security best practices proposed by Samsung Cloud Platform, users can assess and manage security status of the console. Through the best practice analysis, various types of cloud security vulnerabilities can be identified with respect to IAM, authentication key management and network settings.
A report is provided to make it simple to check the analysis result by user requests. An analysis result provides details of the checklist, including diagnostic criteria and action guides.
User → Create/Request Assessment → Config Inspection → API Calls → Compute, Container, NW, Database, Storage, Logging
Whether you’re looking for a specific business solution or just need some questions answered, we’re here to help