Configuring a cloud target for security scanning is essential to ensure the safety and integrity of your cloud infrastructure. This guide will walk you through the process of setting up your cloud environment for a thorough security assessment. By providing accurate information and credentials, you’ll enable the scanner to effectively evaluate your cloud assets and identify potential vulnerabilities.

Access the Scanner Setup

  1. To begin, navigate to the Targets page and click on the Setup Target button.

  1. You will be directed to the target setup wizard, where you can update and configure the target.

Breakdown of each step

1. Get Started

Begin by providing basic details about your cloud environment:

2. Cloud Provider

Specify the cloud provider you’re using. This helps the automated scan to complete more efficiently and detect vulnerabilities accurately based on the specific features and configurations of your cloud environment:

3. User Credentials

Enter the credentials for an IAM user with a security analyst role to facilitate the verification of your cloud assets and perform security testing:

4. Programmatic Access

Provide credentials for programmatic access to grant the scanner automated access to your cloud account. It ensures that the scanner can perform a comprehensive assessment without manual intervention:

5. Additional Notes

Use this section to provide any extra information that may be relevant for the scanning process:

Special Instructions: Include any specific configurations or areas of concern.

Rate Limiting Details: Mention any rate limits that might affect the scanning process.

Focus Areas: Highlight particular assets or configurations that should be prioritized during the scan.

6. Complete Setup

After reviewing all the information you’ve provided, click Complete Setup to finalize the configuration for your cloud target. This will initiate the security scan of your cloud environment.

| If you have any questions or need further assistance, please reach out to our support team.