Zetafence(TM) enriches a vast array of entities with granular metadata to create a comprehensive security blueprint. From AWS, Kubernetes, and GCP environments to individual users, groups, hosts, applications, and network devices, our platform captures critical details. Cloud resources such as IAM policies, S3 buckets, EC2 instances, and security groups are meticulously documented, along with dynamic data like CloudTrail logs. This rich metadata empowers organizations to visualize complex relationships, identify vulnerabilities, and optimize security posture. Entities and associations discovered by Discovery Agents are richly populated with metadata key-value pair attributes in an automatic manner. Those metadata attributes are heavily utilized by security scanning services to determine attack paths, and build correlations. Attributes that are maintained and updated by the operators are also included as part of the enriched metadata.Documentation Index
Fetch the complete documentation index at: https://docs.zetafence.com/llms.txt
Use this file to discover all available pages before exploring further.
