Skip to main content

Cloud Security Misconfiguration Scanning

Overview

Learn how to detect and remediate cloud security risks using DeepTraq’s Cloud Security Misconfiguration scanning capabilities. These scans help organizations identify hidden vulnerabilities, excessive permissions, and exposed workloads across their cloud infrastructure.

With DeepTraq, you can run targeted or comprehensive scans to ensure your cloud environment follows security best practices and remains protected from potential threats.

This guide explains how to start and manage cloud security scans within the DeepTraq platform.


Prerequisites

Before starting a cloud security scan, ensure the following:

  • Active DeepTraq user account
  • Cloud environment integrated with DeepTraq
  • Required permissions to initiate security scans
  • Appropriate access to view cloud security findings

Accessing Cloud Security Scans

To begin scanning your cloud environment:

  1. Navigate to Cloud Security → Misconfigurations
  2. Review available scan options
  3. Select the scan type that matches your security assessment needs
  4. Start a new scan

Available Scan Types

  • Comprehensive Cloud Environment Scan
  • Privileged Users Scan
  • Workloads Exposure Scan

Running a Comprehensive Cloud Environment Scan

The Comprehensive Cloud Environment Scan performs a full security evaluation of your cloud infrastructure.

Steps

  1. Navigate to Cloud Security → Misconfigurations
  2. Click Start New Scan
  3. Select Comprehensive Cloud Environment Scan
  4. Confirm scan configuration
  5. Start the scan

This scan analyzes your environment for configuration weaknesses, policy violations, and security risks across cloud services.

Once initiated, the scan will appear in the Active Scans section where you can monitor its progress.


Running a Privileged Users Scan

The Privileged Users Scan helps identify accounts with excessive permissions that could lead to unauthorized access or privilege escalation.

Steps

  1. Navigate to Cloud Security → Misconfigurations
  2. Click Start New Scan
  3. Select Privileged Users Scan
  4. Review scan configuration
  5. Start the scan

This scan evaluates user roles, permissions, and privilege assignments to ensure access is limited to the minimum required level.


Running a Workloads Exposure Scan

The Workloads Exposure Scan detects publicly accessible workloads and services that may expose your cloud environment to external threats.

Steps

  1. Navigate to Cloud Security → Misconfigurations
  2. Click Start New Scan
  3. Select Workloads Exposure Scan
  4. Confirm scan configuration
  5. Start the scan

This scan identifies services, ports, or endpoints that are publicly accessible and may require security hardening.


Monitoring Scan Results

After initiating a scan:

  1. Navigate to Cloud Security → Scan Results
  2. Review scan status and findings
  3. Identify critical vulnerabilities or misconfigurations
  4. Follow recommended remediation steps

DeepTraq provides actionable insights to help security teams quickly resolve detected risks.


Best Practices

To maintain a secure cloud environment:

  • Run security scans regularly
  • Monitor privileged access and role assignments
  • Restrict public exposure of workloads
  • Review security recommendations after each scan
  • Address high-risk vulnerabilities immediately