Our Integrations
Covering More of the Cloud's Attack Surface
Modern threat actors are compromising identity providers, and moving across environments through cloud service providers, SaaS apps, and CI/CD pipelines. Permiso's library of integrations tracks activity across cloud environments.
            Okta
Monitor when multiple MFA verifications were denied, factors were reset or deactivated, as well as Okta detections such as threat suspected, suspicious sessions, high risk session API tokens created and more
Identity Provider
Identity Provider
            Ping Identity
Detect bucket versioning being disabled, MFADelete disabled, Workmail Mailbox Exported Public, Public access and more.
Identity Provider
Identity Provider
Google Cloud Platform
Detect suspicious activity in Google Cloud Platform such as Compute, Storage, App Engine, Secrets Manager, Logging, Network, SSO and IAM.
Infrastructure
IaaS
            AWS
S3
Detect bucket versioning being disabled, MFADelete disabled, Workmail Mailbox Exported Public, Public access and more.
Infrastructure
IaaS
            AWS
S3
Detect bucket versioning being disabled, MFADelete disabled, Workmail Mailbox Exported Public, Public access and more.
Infrastructure
IaaS
            AWS
IAM
Monitor Root passwords or email changes, activity of potentially compromised secrets, mass mailer scripts, roles that allow for external access and more.
Infrastructure
IaaS
            AWS
Config
Monitor if Amazon Config has been disabled in any of your environments, a common tactic by threat actors.
Infrastructure
IaaS
            AWS
ECS
Detects when an Elastic Container Service (ECS) Task Definition has been modified and run.
Infrastructure
IaaS
            AWS
Cloudwatch
Detect when a CloudWatch alarm has been deleted, this may be an attempt to evade detection.
Infrastructure
IaaS
            AWS
APIGateway
Detect when an AWS API Gateway key was created. These keys grant access to an API, often for development purposes.
Infrastructure
IaaS
            AWS
Workmail
Detect when a workmail mailbox has been exported, exported public or if a suspicious user has been created.
Infrastructure
IaaS
            AWS
SSM
Detect SSM remote code execution and suspected malicious script execution.
Infrastructure
IaaS
            AWS
GuardDuty
Monitor when IPSet Lists have changed, threat lists of changed or status has been altered.
Infrastructure
IaaS
            AWS
RDS
Monitor RDS Snapshot sharing with vendors, given or restored public access, as well as deletion protection disabled and master password resets.
Infrastructure
IaaS
            AWS
Cloudtrail
Get notified when CloudTrail logging has been stopped or deleted, a common tactic employed by threat actors.
Infrastructure
IaaS
            AWS
Route53
Monitor Route53 domain transfer activity as well as those created with public zone selected.
Infrastructure
IaaS
            AWS
CodeBuild
Detect any AWS CodeBuild projects that have been made public.
Infrastructure
IaaS
            AWS
Resource Access Manager (RAM)
Learn when AWS Resource Access Manager (RAM) settings were modified
Infrastructure
IaaS
            AWS
SES
SES Access key activity such as enable sending, request production status, list identities verified, verify sending status, key abuse, key list identities and more.
Infrastructure
IaaS
            AWS
Elastic Block Storage (EBS)
Monitor when Amazon Elastic Block Store (EBS) encryption has been disabled for a particular region.
Infrastructure
IaaS
            AWS
STS
Learn when federation tokens are created that have overly permissive policies that allows all actions.
Infrastructure
IaaS
            AWS
Secrets Manager
Detect when an identity has successfully retrieved a key from AWS Secrets Manager via the GetSecretValue action.
Infrastructure
IaaS
            Microsoft
Azure Compute
Learn when an azure virtual machine (VM) has had commands executed against it, which may execute as System.
Infrastructure
IaaS
            Microsoft
Azure Blob Storage
Detect when Azure blob storage has had permissions modified that could lead to data exposure.
Infrastructure
IaaS
            Microsoft
Azure Key Vault
Monitor when an Azure Key Vault was either created or updated in order to secure certificates, connection strings, encryption keys and passwords.
Infrastructure
IaaS
            Microsoft
Azure Automation
Discover when Automation Runbooks have been created or deleted, webhooks have been created or code has changed, as well as when accounts were created or deleted.
Infrastructure
IaaS
            Microsoft
Defender
Know when an Azure Defender for Cloud alert has been suppressed, a common tactic by threat actors.
Infrastructure
IaaS
            Microsoft
Azure Network
Monitor when Azure Network watchers are created, updated or deleted, packet capture was created or updated or network taps are created or updated.
Infrastructure
IaaS
            Microsoft
Azure Backup Vault
Learn when Azure Backup Vaults are created or disabled, signs of ransomware or similar attacks.
Infrastructure
IaaS
            Microsoft
Azure Role-based Access Control
Learn when Azure Backup Vaults are created or disabled, signs of ransomware or similar attacks.
Infrastructure
IaaS
            Microsoft
Entra ID
Learn when service principle creates certificates or secrets, PIM identity denied role as well as when alerts are fired or disabled, as well as tenants or resources offboarded. Monitor when general admin or high risk admin, privileged admin, medium risk admin and global admin role memberships are added.
Identity Provider
Identity Provider
            Microsoft
Entra ID IAM
Learn when password reset verification is blocked, registered app certificates created as well as suspicious MFA activity such as factor deletion or rotation by both user and Admins.
Identity Provider
Identity Provider
            Applications
Detect suspicious gmail activity such as deep scan disabled, routing rules modified or delayed delivery disabled, in addition to password reuse enabled or strong enforcement disabled.
SaaS
Productivity Tools
            IAM
Monitor when accounts are disabled, passwords have leaked, MFA disabled, admin role assignment and suspicious login behavior.
SaaS
Productivity Tools
            Account
Learn when domains have been added or removed to the trusted list for the account.
SaaS
Productivity Tools
            Drive
Detect when an identity has performed a mass deletion or download of files and folders.
SaaS
Productivity Tools
            Microsoft
Exchange
Detect transport rules and inbox rules that redirect or forward to external domains, when identities give full access to another mailbox or forwarded to an external domain.
SaaS
Productivity Tools
            Microsoft
Sharepoint
Detect when an identity has performed a mass deletion or download of files and folders, as well as malware detections via Microsoft 365 virus detection.
SaaS
Productivity Tools
            Microsoft
OneDrive
Detect when an identity has performed a mass deletion or download of files and folders, as well as malware detections via Microsoft 365 virus detection.
SaaS
Productivity Tools
            Github
Monitor when Github repositories have been transferred outside the organization or updated to public.
SaaS
Code Repository
            Atlassian
Jira
Monitor when a Jira Service has been deleted, mail queue flushed, monitor JMX disabled, global permissions added and more.
SaaS
Ticketing
            Atlassian
Confluence
Detection for your company's wiki when support Zip is created or downloaded, data is exported, or global settings are edited.
SaaS
Collaboration Tools
            1Password
Threat detection for 1Password's password management system.
SaaS
Security
            Snowflake
Detect anomalous access, compromised credentials and malicious data access, credential leakage in Snowflake.
SaaS
Data & Analytics
Slack
Detect when EKM keys are added, user anomaly exfiltration, reconnaissance and other suspicious behavior in a slack instance.
SaaS
Productivity Tools
Salesforce
CRM
Detect anomalous access and activity into your salesforce account, exporting of data and more
SaaS
Productivity Tools
            Terraform
Hashicorp
Inventory all of your users in Terraform, monitor their posture and corresponding risk to help reduce the attack surface and maintain least privilege.
Infrastructure
PaaS
            Zoom
Inventory all of your users in Zoom monitor their posture and corresponding risk to help reduce the attack surface and maintain least privilege.
SaaS
Productivity Tools
            Notion
Inventory all of your users in Notion, monitor their posture and corresponding risk to help reduce the attack surface and maintain least privilege.
SaaS
Productivity Tools
            Miro
Inventory all of your users in Miro, monitor their posture and corresponding risk to help reduce the attack surface and maintain least privilege.
SaaS
Productivity Tools
            Gitlab
Gitlab Cloud
Inventory all of your users in Gitlab Cloud, monitor their posture and corresponding risk to help reduce the attack surface and maintain least privilege.
SaaS
Code Repository
            Postman
Inventory all of your users in Postman, monitor their posture and corresponding risk to help reduce the attack surface and maintain least privilege.
SaaS
Security
            Open AI
Inventory all of your users in Open AI, monitor their posture and corresponding risk to help reduce the attack surface and maintain least privilege.
SaaS
AI Provider
            Vanta
Inventory all of your users in Vanta, monitor their posture and corresponding risk to help reduce the attack surface and maintain least privilege.
SaaS
Security
            Grafana Labs
Inventory all of your users in Grafana Labs, monitor their posture and corresponding risk to help reduce the attack surface and maintain least privilege.
SaaS
Data & Analytics
            FrontEgg
Inventory all of your users in FrontEgg, monitor their posture and corresponding risk to help reduce the attack surface and maintain least privilege.
SaaS
Security
            Anthropic
Inventory all of your users in Anthropic, monitor their posture and corresponding risk to help reduce the attack surface and maintain least privilege.
SaaS
AI Provider
            Docusign
Inventory all of your users in Docusign, monitor their posture and corresponding risk to help reduce the attack surface and maintain least privilege.
SaaS
Productivity Tools
            Semgrep
Inventory all of your users in Semgrep, monitor their posture and corresponding risk to help reduce the attack surface and maintain least privilege.
SaaS
Security
            Calendly
Inventory all of your users in Calendly, monitor their posture and corresponding risk to help reduce the attack surface and maintain least privilege.
SaaS
Productivity Tools
            Sentry
Inventory all of your users in Sentry, monitor their posture and corresponding risk to help reduce the attack surface and maintain least privilege.
SaaS
Security
            Atlassian
BitBucket
Inventory all of your users in BitBucket, monitor their posture and corresponding risk to help reduce the attack surface and maintain least privilege.
SaaS
Code Repository
            Tableau
Inventory all of your users in Tableau, monitor their posture and corresponding risk to help reduce the attack surface and maintain least privilege.
SaaS
Data & Analytics
            Deel
Inventory all of your users in Deel, monitor their posture and corresponding risk to help reduce the attack surface and maintain least privilege.
SaaS
Human Resources
            Trello
Inventory all of your users in Trello monitor their posture and corresponding risk to help reduce the attack surface and maintain least privilege.
SaaS
Productivity Tools
            Dropbox
Inventory all of your users in Dropbox, monitor their posture and corresponding risk to help reduce the attack surface and maintain least privilege.
SaaS
Productivity Tools
            Hubspot
Inventory all of your users in Hubspot, monitor their posture and corresponding risk to help reduce the attack surface and maintain least privilege.
SaaS
CRM
            Duo Security
Inventory all of your users in Duo Security, monitor their posture and corresponding risk to help reduce the attack surface and maintain least privilege.
Identity Provider
Identity Provider
            Smartsheet
Inventory all of your users in Smartsheet, monitor their posture and corresponding risk to help reduce the attack surface and maintain least privilege.
SaaS
Productivity Tools
            Zoho
Inventory all of your users in Zoho CRM, monitor their posture and corresponding risk to help reduce the attack surface and maintain least privilege.
SaaS
CRM
            Zendesk
Inventory all of your users in Zendesk, monitor their posture and corresponding risk to help reduce the attack surface and maintain least privilege.
SaaS
Ticketing
            Xero
Inventory all of your users in Xero, monitor their posture and corresponding risk to help reduce the attack surface and maintain least privilege.
SaaS
Accounting
            Apollo io
Inventory all of your users in Apollo, monitor their posture and corresponding risk to help reduce the attack surface and maintain least privilege.
SaaS
Productivity Tools
            Asana
Inventory all of your users in Asana, monitor their posture and corresponding risk to help reduce the attack surface and maintain least privilege.
SaaS
Productivity Tools
            Automox
Inventory all of your users in Automox, monitor their posture and corresponding risk to help reduce the attack surface and maintain least privilege.
SaaS
Security
            BambooHR
Inventory all of your users in BambooHR, monitor their posture and corresponding risk to help reduce the attack surface and maintain least privilege.
SaaS
Human Resources
            Cisco Meraki
Inventory all of your users in Cisco Meraki, monitor their posture and corresponding risk to help reduce the attack surface and maintain least privilege.
SaaS
Security
            Cloudflare
Inventory all of your users in Cloudflare, monitor their posture and corresponding risk to help reduce the attack surface and maintain least privilege.
SaaS
Security
            Databricks
Inventory all of your users in Databricks, monitor their posture and corresponding risk to help reduce the attack surface and maintain least privilege.
SaaS
Data & Analytics
            Dynatrace
Inventory all of your users in Dynatrace, monitor their posture and corresponding risk to help reduce the attack surface and maintain least privilege.
SaaS
Security
            JFrog
Artifactory
Inventory all of your users in JFrog Artifactory, monitor their posture and corresponding risk to help reduce the attack surface and maintain least privilege.
SaaS
Security
            Mailchimp
Inventory all of your users in Mailchimp, monitor their posture and corresponding risk to help reduce the attack surface and maintain least privilege.
SaaS
Productivity Tools
            Monday
Inventory all of your users in Monday, monitor their posture and corresponding risk to help reduce the attack surface and maintain least privilege.
SaaS
Productivity Tools
            ServiceNow
Inventory all of your users in ServiceNow, monitor their posture and corresponding risk to help reduce the attack surface and maintain least privilege.
SaaS
Ticketing
            Webex
Inventory all of your users in Webex, monitor their posture and corresponding risk to help reduce the attack surface and maintain least privilege.
SaaS
Productivity Tools
  
    
  
  Hear Ye, Hear Ye
Subscribe to Cloud Chronicles for the latest in cloud security!

  
  
  
