​
​

All accounts


LZ

    Dashboard

    Inventory

    Activity Log

    Findings

    IAM

    Workload

    IaC

    Policies

    Compliance

    Reports


    Accounts

    Audit

    Settings

1 Organization

4 Accounts

2
2

2 Organizations

7 Subscriptions

4
3

1 Organization

2 Projects

2

3,985

IAM Resources

3,432

Kubernetes Resources

1,960

Network Resources

869

Compute Resources

654

Data Resources

508

Security Resources

355

Management Resources

251

Container Resources

Open Findings

Severity

is

Critical

or

High

102

Critical

3%

851

High

24%

Categories

IAM

526

Workload Protection

169

Network

123

Data

50

Compute

42

Secrets

33

Anomaly Detection

4

Custom Policies

3

Trends

Last 30 days

118

Opened findings

10 have high/critical severity

25 due to new features

188

Resolved findings

2

Starred findings

0

Snoozed findings

0

Tickets created

Compliance

Last 30 days

Unencrypted Resources

59%

+5%

Demo

65%

-13%

Secrets

85%

-14%

iam

73%

-6%

Tenable Best Practices

56%

-11%

AWS Well Architected

62%

+13%

CIS AKS 1.2.0

66%

-10%

CIS AWS 2.0.0

43%

CIS Azure 2.0.0

66%

-3%

CIS EKS 1.2.0

64%

+3%

CIS GCP 1.3.0

58%

+5%

CIS GKE 1.3.0

59%

+3%

CSA CCM 4.0.2

72%

GDPR

60%

-14%

HIPAA

58%

-4%

ISO 27001:2022

64%

-9%

Microsoft Cloud Security Benchmark V1

56%

+1%

MITRE ATT&CK v13

76%

-3%

NIST 800-171 Rev2

63%

+1%

NIST 800-53 Rev5

66%

-2%

NIST CSF 1.1

57%

NYDFS 23 NYCRR 500

58%

+1%

PCI DSS 4.0

65%

SOC2 Type II

71%

-2%

Toxic Combinations

17 public workloads with critical vulnerabilities and high privileges

118 public storage accounts with shared key access

72 public workloads with an unpatched OS

56 external principals with access to sensitive data

47 guest users with access to sensitive data

45 3rd party identities with access to sensitive data

29 public virtual machines with high privileges

28 public workloads with an OS that is at or nearing EOL

19 public data resources with sensitive data

9 public data resources without encryption at rest

3 public App services with high privileges

2 ECS services with critical vulnerabilities and high privileges

2 public data resources with sensitive data

56 external principals with high privileges

47 guest users with high privileges

16 IAM users with no MFA and high privileges

11 public functions with high privileges

If you only have 5 minutes...


Root user MFA is not enabled

root user

Production (226312341234)


Public S3 bucket

ermetic-super-secret-customers-information

Production (226312341234)


Public EC2 instance

prd-api-svc

Production (226312341234)


EC2 instance has a suspected malicious file

CnappgoatCWPPMaliciousEC2

Dev (463112341234)


Cloud Run service is exposing secrets

hello

Prd-Env (prd-env-341521)

Resources Exposing Secrets

Show More

3 secrets are exposed through Lambda function environment variables


2 secrets are exposed through ECS task definition environment variables


1 secret is exposed through EC2 instance tags


1 secret is exposed through Systems Manager parameters


5 secrets are exposed through logic app parameters


3 secrets are exposed through event hubs namespace tags


3 secrets are exposed through logic app tags


2 secrets are exposed through virtual machine tags


2 secrets are exposed through container registry tags


2 secrets are exposed through network interface tags


2 secrets are exposed through Storage Account blob container tags


1 secret is exposed through managed disk tags


1 secret is exposed through ssh public key tags


1 secret is exposed through network security group tags


1 secret is exposed through private endpoint tags


1 secret is exposed through public ip address tags


1 secret is exposed through virtual network tags


1 secret is exposed through resource group tags


1 secret is exposed through app service tags


1 secret is exposed through Cloud Run service environment variables


1 secret is exposed through Cloud function environment variables

Public Resources

Show More

62 EC2 Instances

1 new in the last 30 days

12 Storage Account Blob Containers

8 SQL Servers

8 Cloud Functions

7 S3 Buckets

1 new in the last 30 days

2 Storage Buckets

Anomaly Detection

Last 30 days

Unusual Permission Management (37)

Unusual Data Access (21)

Unusual Network Access Management (18)

Unusual Reconnaissance (15)

Unusual Privilege Escalation (2)

9 Mar11 Mar13 Mar15 Mar17 Mar19 Mar21 Mar23 Mar25 Mar27 Mar29 Mar31 Mar2 Apr4 Apr7 Apr010203040

Top Accounts at Risk

Production

36

255

249

331

57

Dev

28

134

137

210

47

Org2Development

18

89

143

60

Prd-Env (prd-env-341521)

6

54

39

32

Org2Staging

4

4

7

8

Org1Subscription2

3

132

277

508

Org1Subscription1

2

160

333

168

Top Finding Types

EC2 instance has critical vulnerabilities

14

32

8

Public EC2 instance

14

13

25

4

EC2 instance has an unpatched operating system

11

45

9

Inactive managed identity in subscription

11

8

5

45

Overprivileged IAM role

8

14

19

22

Inactive IAM role

6

35

76

22

Virtual Machine has an unpatched operating system

5

8

23

4

Workload Protection

Vulnerability Status
Show More

Critical

51%

High

38%

Medium

< 1%

None

10%

216Virtual Machines
Critical CVEs
Show More

CVE-2020-1938

Found on 1 Workload

First Seen 4 days ago

CVE-2021-45046

Found on 2 Workloads

First Seen 51 days ago

CVE-2021-40438

Found on 1 Workload

First Seen 51 days ago

CVE-2023-6345

Found on 5 Workloads

First Seen 86 days ago

CVE-2023-2136

Found on 1 Workload

First Seen 207 days ago

Operating System Status

All OSs

At or Nearing End-of-Life

25%

Unpatched

44%

Operating System OK

31%

216Virtual Machines
0

14 EC2 Instances


1 Virtual Machine


2 VM Instances