The Security & Compliance Dashboard surfaces findings across:

  • IAM permissions and privilege exposure

  • Encryption configurations

  • Public resource exposure

  • Logging and audit readiness

  • Network configuration risks

  • Compliance control gaps