the infrastructure, applications, databases, containers, APIs, and other components, •Detect misconfigurations, risky permissions, and flaws Real Time Monitoring and Alerts: •Monitor suspicious behaviors, •Generate alerts from them, •Aware of the cloud security attacks.