Skip to main content

CSPM Coverage

Supported Cloud Services & Resource Checks

DeepTraq Cloud Security Posture Management (CSPM) continuously analyzes misconfigurations, security risks, and compliance gaps across supported cloud services. Each service includes a defined set of security checks aligned with best practices.


Amazon Web Services (AWS)

DeepTraq provides broad coverage across core AWS services:

ServiceChecksServiceChecks
EC270IAM43
RDS34CloudWatch22
S321Cognito12
CloudTrail11CloudFront13
OpenSearch12Glue12
VPC11SageMaker11
ELBv211ECS11
Redshift10Neptune10
GuardDuty9DynamoDB9
Lambda9API Gateway8
WAF / WAFv210Network Firewall7
EKS7ECR6
KMS5Route534
Secrets Manager4EventBridge4
CloudFormation3Athena3
Config2SecurityHub1

+ 50+ additional AWS services including Autoscaling, Kafka, ElastiCache, Backup, SNS, SQS, Macie, Inspector2, Step Functions, and more.


Microsoft Azure

Coverage across identity, compute, storage, and monitoring services:

ServiceChecksServiceChecks
Defender25App Services19
Storage18Entra ID (IAM)15
Monitor15SQL Server12
Virtual Machines12Key Vault10
Network9PostgreSQL8
MySQL4AKS4
Cosmos DB3Container Registry3
IAM3Databricks2

+ Additional services including Policy, App Insights, AI Search, and API Management.


Google Cloud Platform (GCP)

Security checks across compute, storage, and identity:

ServiceChecksServiceChecks
Compute Engine30Cloud SQL22
IAM12Logging10
Cloud Storage10DNS3
BigQuery3API Keys3
KMS2GKE1

+ Additional services including Container Registry, Dataproc, and Artifact Registry.


Oracle Cloud Infrastructure (OCI)

Focused coverage for core infrastructure and identity services:

ServiceChecksServiceChecks
Identity16Events13
Network6Object Storage4
Compute3Block Storage2
Analytics1Audit1
Cloud Guard1Database1

+ Additional services including File Storage, Integration, and KMS.


Notes

  • Checks include misconfiguration detection, security best practices, and risk identification
  • Coverage is continuously expanding with new services and rules
  • Advanced checks include identity exposure, public access risks, encryption gaps, and logging misconfigurations