Visibility of vulnerabilities, risks, and incorrect configurations.
Action model in Cloud Security (architecture, policies, roles, among others).
Detection & response
Logs, content and detection runbooks, incident response and recovery.
Automation and security integration in the development pipeline.
Knowledge transfer and Cloud Security awareness.
Practices and simulations to validate detection and response capability