Recommendations
  • 1 minute to read
  • Dark
    Light
  • PDF

Recommendations

  • Dark
    Light
  • PDF

Article summary

Cloud Entitlements evaluates the identities within your Cloud Service Providers (CSPs) to detect misconfigurations and offer security recommendations based on your Security policies.

Important

If you decide to implement these changes, you must make them directly in your CSP.

All recommendations are centralized in the Recommendations report.

If you need help consulting the security recommendations, refer to How to view recommendations.


Was this article helpful?