in the infrastructure, applications, databases, containers, APIs, and other components, • Detect misconfigurations, risky permissions, and flaws Real Time Monitoring and Alerts: • Monitor suspicious behaviors, • Generate alerts from them, • Aware of the cloud security attacks