Cloud Security Supported Deployment Types
The following table summarizes the CSM features available relative to each deployment type.
Deployment type | Agent Required (7.46+) | CSM Misconfigurations | CSM Threats | CSM Vulnerabilities | CSM Identity Risks | CSM Agentless Scanning |
---|
AWS Account | | | | | | |
Azure Account | | | | | | |
GCP Account | | | | | | |
Terraform | | | | | | |
Docker | | | | | | |
Kubernetes | | | | | | |
Linux | | | | | | |
Amazon ECS/EKS | | | | | | |
Windows | | | | beta | | |
AWS Fargate ECS/EKS | | | beta | | | |
The following table summarizes the scope of coverage available relative to each CSM feature.
Resources monitored | CSM Misconfigurations | CSM Threats | CSM Vulnerabilities | CSM Identity Risks | CSM Agentless scanning |
---|
Resources in AWS Account | | | | | |
Resources in Azure Subscription | | | | | |
Resources in GCP Project | | | | | |
Kubernetes Cluster | | | | | |
Docker Host | | | | | |
Linux Host | | | | | |
Windows Host | | | beta | | |
Docker Container | | | | | |
Container Image | | | | | |
IAM in AWS Account | | | | | |
Note: CSM Misconfigurations additionally monitors common resources used in your cloud accounts that are running Windows and AWS Fargate, such as EC2 instances, RDS, S3, and ELB.