Hard2bit
← Back to glossary Tools and platforms

CSPM

What is CSPM

CSPM (Cloud Security Posture Management) is a category of tools that continuously monitor and assess the security posture of cloud infrastructure (AWS, Azure, Google Cloud, etc.). CSPM automates the detection of misconfiguration, unmet regulatory compliance, and policy deviations. Examples: Prisma Cloud (Palo Alto), CloudSploit (AWS), ScoutSuite (multi-cloud). A typical CSPM: (1) Reads cloud resource configuration (S3 buckets, security groups, IAM policies), (2) Compares against benchmarks (CIS AWS Foundations), (3) Reports deviations (public bucket, security group open to 0.0.0.0), (4) Remediates some misconfiguration automatically or alerts for manual review.

Why it matters

For a CISO with cloud infrastructure, CSPM is almost mandatory. The reason: the cloud introduces operational freedom (developers launch resources easily) but with exponential security risk. Without CSPM, a typical startup has: public S3 buckets with sensitive data, security groups allowing SSH from the internet, RDS without encryption, IAM policies with overly broad permissions, disabled logs. Each of these is a vulnerability. CSPM automatically detects these misconfigurations and alerts or remediates. Regulations like NIS2, DORA, ISO 27001 require continuous proof of security posture. CSPM automates that assessment. Without CSPM, manually reviewing the configuration of 100+ resources is infeasible. With CSPM, you have real-time alerts.

Key points

CSPM is more preventive than detective. It does not monitor network traffic (that is the job of firewalls, SIEM). CSPM monitors how resources are configured. An unencrypted S3 bucket is a risk, even without active attack.

Most cloud breaches are due to misconfiguration, not zero-day vulnerabilities. An attacker sees a public bucket, explores it, and steals data. Technically trivial. CSPM prevents this by automatically detecting the public bucket.

CSPM understands business context better than generic scanning. It can alert on overly permissive security groups, but also understand company policies: 'production databases must have automated backups, encryption at rest, and role-based access'.

CSPM automatic remediation is powerful but requires care. A CSPM that automatically closes an overly open security group prevents breach, but could also cause downtime if misconfigured. Requires approval or fast rollback.

Example: misconfiguration detection in AWS with CSPM

A company with 200 EC2 instances, 50 S3 buckets, and 100 RDS databases in AWS deploys Prisma Cloud (CSPM). On first run it discovers: (1) 12 public S3 buckets (anyone on the internet can read data). (2) 5 security groups allow SSH (port 22) from 0.0.0.0 (anyone on the internet can attack). (3) 20 RDS without encryption at rest. (4) 30 IAM policies with s3:* permission on all resources (if that credential is stolen, damage is maximum). (5) CloudTrail disabled on 3 accounts. Each one of these is a vulnerability. Manually reviewing 1000+ resources would take weeks. CSPM detects them in minutes. The company: (1) Immediately closes public buckets. (2) Restricts security groups to specific ranges. (3) Enables encryption on RDS with one click. (4) Reduces IAM policies to least privilege. (5) Enables CloudTrail globally. After that, CSPM continues monitoring: if a developer creates an unencrypted bucket, CSPM alerts in 5 minutes.

Common mistakes

  • Assuming cloud default configuration is secure. It is not. Many services have open defaults 'for operational convenience'. CSPM is necessary to close those doors.
  • Not acting on CSPM alerts. A CSPM is useful only if you actually remediate the problems it reports. If it reports 50 misconfigurations but the team ignores them because 'not critical', CSPM is useless.
  • Not combining CSPM with other controls. CSPM says 'bucket without encryption'. But you also need: (1) Monitoring (if someone accesses the bucket, alert), (2) Audit (who accessed what data), (3) Backup (if data is deleted). CSPM + SIEM + Audit together are powerful.
  • Allowing automatic remediation without governance. If CSPM automatically changes IAM policies or closes security groups, an error can cause downtime. Requires role-based approval or sandboxing.

Related services

This concept may be related to services such as:

Frequently asked questions

What is the difference between CSPM and vulnerability scanning?

Vulnerability scanning searches for technical issues (missing patches, open ports). CSPM searches for misconfiguration (public bucket, encryption disabled). Both are complementary. A CSPM detects the public bucket; a vulnerability scanner detects if the machine inside has missing patches.

How does CSPM work with multi-cloud infrastructure?

Multi-cloud CSPM (ScoutSuite, Prowler) connects to AWS, Azure, GCP simultaneously and evaluates all against common security benchmarks (CIS benchmarks). Reports misconfiguration on each cloud in a unified dashboard.

Can CSPM automate remediation of misconfiguration?

Yes, some CSPM tools can remediate automatically (close public bucket, enable encryption). Requires care: an automatic change could affect operations. Safe approach: alert first, require manual approval, then remediate.

What is the benefit of continuous CSPM vs manual audit?

Manual: annual cloud configuration audit. You discover problems after 12 months. Continuous CSPM: monitors every change in real time. If a developer creates an unencrypted bucket, alerts in minutes not months.