All Products
Search
Document Center

Security Center:Overview of Cloud Security Posture Management (CSPM)

Last Updated:Mar 31, 2026

Cloud Security Posture Management (CSPM) continuously monitors your cloud environment to detect and fix security risks—misconfigurations in cloud services, vulnerabilities in server configurations, and exploitable attack paths between resources. Use CSPM to reduce your exposure before incidents occur, meet compliance requirements, and understand how a compromised resource could be used to reach other assets.

Use cases

ScenarioWhat it solvesFeature to use
Security hardening across cloud assetsCloud services and servers accumulate misconfigurations that are hard to detect manually.Cloud service configuration check + Baseline check
Compliance auditingMeeting standards such as Multi-Level Protection Scheme (MLPS) 2.0 or CIS requires continuous, automated evidence collection. Baseline check includes built-in compliance check packages and supports custom policies for automated compliance auditing.Baseline check
Attack path analysisA single compromised resource can be a stepping stone to core assets if access paths are not mapped and controlled.Attack path analysis

Core features

Cloud service configuration check

Cloud service configuration check scans your cloud asset configurations to identify security vulnerabilities and compliance gaps caused by misconfigurations—for example, overly permissive ECS security group rules or publicly accessible OSS Buckets.

The following figure shows the workflow. For details, see Cloud service configuration check.

image

Baseline check

Baseline check scans the host operating system for issues such as weak passwords, insecure configurations, and missing critical patches. Checks are based on industry standards and security best practices to help you maintain compliance.

The following figure shows the workflow. For details, see Baseline check.

image

Attack path analysis

Attack path analysis maps access relationships between cloud services—for example, an ECS instance that can control an OSS Bucket through a RAM Role—and presents the full attack chain as a visual topology graph. This lets you identify unnecessary access permissions and potential weak points before they can be exploited. For example: Publicly accessible ECSBound to a high-privilege RAM RoleCan control all core OSS Buckets.

The following figure shows the workflow. For details, see Attack path analysis.

image

Billing

Key concepts

  • Quota: The unit of measurement for paid CSPM operations. Each billable operation (scan, verify, or fix) on an asset instance consumes one quota unit. For example, scanning 15 instances across 10 cloud services with 5 check items consumes 10 × 15 × 5 = 750 quota units.

  • Instance: A specific cloud resource, such as an OSS Bucket or an ECS security group.

  • Check items: Check items fall into two categories:

    • Free check items: Available under Cloud service configuration check. Scans and verifications are unlimited. Only successful remediation consumes quota.

    • Paid check items: Require a paid edition or the CSPM value-added service. The cost is either included in the edition fee or consumes quota, depending on your billing model.

Important

If you authorized CSPM (formerly Cloud service configuration check) before July 7, 2023, you retain access to the free check items that correspond to your original Security Center edition: 80+ for Anti-virus Edition, 90+ for Advanced Edition, and 250+ for Enterprise/Ultimate Edition. This applies both before your subscription expires and upon renewal.

For complete billing details, see Billing overview.

Billing models

CSPM supports two billing models. Before purchasing, you can explore basic detection capabilities with the Basic Edition or apply for a 7-day free trial to evaluate the full Enterprise Edition feature set.

The Basic Edition supports detection and verification of free check items for Cloud service configuration check only. Risk remediation, Baseline check, and Attack path analysis are not available.
SubscriptionPay-as-you-go
Best forLong-term security needs; predictable costsFlexible, short-term, or dynamically scaling scenarios
How to activatePurchase Advanced, Enterprise, or Ultimate Edition; or add the CSPM value-added servicePurchase the CSPM postpaid feature

Subscription

Advanced, Enterprise, or Ultimate Edition

Important

Anti-virus Edition and value-added plan users who have not purchased the CSPM value-added service can detect and verify free Cloud service configuration check items only. Risk remediation, Baseline check, and Attack path analysis are not supported.

FeatureSupported check itemsSupported operationsQuota consumption
Cloud service configuration checkFree check items (Ultimate Edition also supports KSMP check items)Detection and verification; remediation not supportedDoes not consume quota
Baseline checkAdvanced: weak password check items only. Enterprise: all except container security. Ultimate: all.Scan, verify, and remediateIncluded in the edition fee; does not consume quota
Attack path analysisNot supported

CSPM value-added service

Important

If you combine the CSPM value-added service with Advanced, Enterprise, or Ultimate Edition, your edition determines the supported check items and operations for Baseline check (see the table above). Cloud service configuration check and Attack path analysis are not affected by the edition. If you use Anti-virus Edition or a value-added plan, all three features follow the table below.

FeatureSupported check itemsSupported operationsQuota consumption
Cloud service configuration checkAll check items (free + paid)Detection, verification, and remediationFree check items: successful remediation only. Paid check items: scanning, verification, or successful remediation.
Baseline checkAll check itemsDetection, verification, and remediationScanning, verification, or successful remediation
Attack path analysisSupportedIncluded with the paid CSPM service; does not consume quota

Pay-as-you-go

Important

If you only purchase the host and container protection postpaid feature, you can detect and verify free Cloud service configuration check items only. Risk remediation, Baseline check, and Attack path analysis are not supported.

FeatureSupported check itemsSupported operationsQuota consumption
Cloud service configuration checkAll check items (free + paid)Detection, verification, and remediationFree check items: successful remediation only. Paid check items: scanning, verification, or successful remediation.
Baseline checkAll check itemsDetection, verification, and remediationScanning, verification, or successful remediation
Attack path analysisSupportedIncluded with the paid CSPM service; does not consume quota

Host and Container Security and CSPM Pay-as-you-go Service (Deprecated)

Check items:

  • Unprotected/Antivirus: All check items.

  • Host Protection: All check items except for container security check items.

  • Hosts and Container Protection: All check items.

Operations: Scanning, verification, and remediation.

Billing rules:

  • Unprotected/Antivirus: Quota is consumed for successful scans, verifications, or remediation.

  • Host Protection/Hosts and Container Protection: Included in the protection fee. Does not consume Quota.

Get started

  1. Activate CSPM: Authorize and activate CSPM.

  2. Set up Cloud service configuration check:

    1. Add cloud services to be checked.

    2. Configure and run check policies.

    3. View and handle failed check items.

  3. Set up Baseline check:

    1. Install the Security Center agent (see Install the agent) and then manage your servers.

    2. Configure and run baseline check policies.

    3. View and handle baseline risks.

  4. Use Attack path analysis: See Attack path analysis.

FAQ

Billing and quota

Can I switch from Subscription to Pay-as-you-go?

Direct switching is not supported. Wait for your subscription to expire or unsubscribe first, then activate Pay-as-you-go.

Important

Any unused quota from the subscription is forfeited after unsubscribing or expiration.

What happens when quota runs out?

The behavior depends on your billing model:

  • Subscription: The scan task stops early. Results are shown only for checks completed before quota was exhausted. To continue, upgrade your edition or purchase additional quota. See Upgrade.

  • Pay-as-you-go: There is no quota limit. The system bills based on actual usage, and all tasks run to completion.

Feature usage

How do I use CSPM for security hardening?

  1. Activate the CSPM service and grant the required management permissions.

  2. Add the cloud service instances you want to check (such as ECS, RDS).

  3. Configure and run a check policy. After the scan completes, remediate risks based on the results and fix recommendations.

How does Security Center improve database security?

Security Center covers database security at two levels:

  • Cloud service configuration check: Checks external configuration risks of the database—for example, whether the access control whitelist is too permissive, or whether automatic backup and log audit features are enabled.

  • Baseline check: Checks internal security flaws on the server hosting the database—for example, whether database login accounts have weak passwords, or whether the server configuration follows security best practices.

Deactivate CSPM

How do I deactivate CSPM?

The steps depend on your billing model:

  • Basic Edition: No action needed. The Basic Edition provides limited detection capabilities and does not involve fees or quota consumption.

  • Subscription: In the order management center, downgrade your Security Center edition to one that does not include CSPM.

  • Pay-as-you-go: On the Overview page, go to the Pay-as-you-go area and disable CSPM.