Use Cases By Categories¶ ASPM Use Cases¶ IaC Scanning Container Scanning Static Application Security Testing (SAST) Vulnerability Management CSPM Use Cases¶ Asset Inventory Cloud Misconfiguration & Drift Detection CWPP Use Cases¶ Container Security¶ Container Image Scan Runtime Application Hardening Workload Hardening Network Micro-segmentation Cluster Misconfiguration Scan Pod Security Admission Control Admission Controller Least Permissive Posture Assessment¶ Runtime Application Behavior Discovery Audit/Forensics Zero Trust Security AI Workload Security & Advanced Persistent Threat¶ Jupyter Notebook Cryptojacking Hildegard Host Security¶ Host Scan Malware Scan VM Hardening Securing Secrets Manager¶ HashiCorp Vault Hardening CyberArk Conjur Hardening KSPM Use Cases¶ Cluster MisconfigurationAccuknox identifies and flags misconfigurations in your clusters, ensuring that components like RBAC, namespaces, and container security settings follow best practices and remain secure. CIS BenchmarkingKSPM aligns with the CIS Kubernetes Benchmark, offering automated compliance checks against industry standards to ensure your clusters meet security requirements. KIEMK8s Identity and Entitlement Management controls access to Kubernetes resources by managing identities and entitlements. It ensures appropriate permissions, secure access, and auditability for users, services, and applications. Was this page helpful? Thanks for your feedback! Thanks for your feedback! Help us improve this page by using our feedback form.