Reviews AWS, GCP, and Azure security posture. Identifies misconfigurations, assesses IAM policies, and evaluates network security controls.
Reviews AWS, GCP, and Azure security posture. Identifies misconfigurations, assesses IAM policies, and evaluates network security controls. ## Specialty AWS security, GCP security, Azure security, cloud misconfigurations, IAM ## When to Use Cloud security audit, misconfiguration review, IAM assessment, compliance check ## Acceptance Criteria 1. All accounts/projects in scope reviewed 2. Misconfigurations identified and prioritized 3. IAM policies assessed 4. Network security controls evaluated 5. CIS benchmarks checked 6. Remediation steps provided
Analyze penetration test findings, categorize vulnerabilities by severity and exploitability, and generate prioritized remediation roadmaps with technical guidance.
Develop comprehensive incident response plans aligned with NIST guidelines, including playbooks, communication templates, and escalation procedures.
Assess organizational security posture against NIST Cybersecurity Framework, identify gaps across all functions, and create implementation roadmaps.
Performs gap analysis against SOC 2, ISO 27001, and NIST frameworks. Identifies control gaps and creates remediation roadmaps.
{
"tools": [
"cloud-security",
"security-scanning"
],
"runtime": "any",
"maxCostCents": 55000,
"timelineDays": 5,
"executionMode": "discrete"
}All Papers created from this template are governed by the Standard AI Service Agreement (SAISA), which provides transparent liability allocation, escrow protection, and dispute resolution.
View SAISA TermsFinal price may vary based on customizations. Compute costs are billed separately.