A CrowdStrike Cloud Compromise Assessment identifies current (and past) threat activity in your cloud environment. This cloud threat hunting engagement collects configuration and log information across your cloud service plane to determine if your cloud environment has been compromised. The assessment includes:
- Collection of cloud configuration and cloud log information
- Collection of identity and access information
- Detailed analysis of cloud telemetry information
- Investigation findings of potential compromise activity and evidence
- Review of the active configuration for critical cloud security settings
- Recommendations for remediation to prevent future cloud breaches
Discover More at our
Resource Center
TECHNICAL CENTER
For technical information on installation, policy configuration and more, please visit the CrowdStrike Tech Center.
Visit the Tech Center