The internal audit team is preparing for an internal review. You have been asked to provide a list of configuration policy breaches against the NIST benchmark.
Where can you access this list?
A.
Export Cloud Posture – Cloud indicators of attack
B.
Export Cloud Posture – Indicators of misconfiguration
InCrowdStrike Falcon Cloud Security, configuration policy breaches aligned to regulatory and security frameworks such asNISTare tracked asIndicators of Misconfiguration (IOMs). These findings represent deviations from best-practice configurations and compliance benchmarks.
To provide an auditable list of NIST-related configuration violations, the correct location isExport Cloud Posture – Indicators of misconfiguration. This export includes detailed records of misconfigured resources, associated benchmarks (NIST, CIS, etc.), affected cloud accounts, severity, and remediation guidance. It is specifically designed to support internal and external audit requirements.
Cloud Indicators of Attack focus on threat activity, not compliance. Remediation status reports focus on fix progress rather than raw policy violations. The Cloud Posture dashboard provides a high-level summary but does not deliver the detailed, exportable list required for audits.
Therefore,Export Cloud Posture – Indicators of misconfigurationis the correct and documented source.
Contribute your Thoughts:
Chosen Answer:
This is a voting comment (?). You can switch to a simple comment. It is better to Upvote an existing comment if you don't have anything to add.
Submit