All Products
Search
Document Center

Security Center:Configure and run check policies

Last Updated:Mar 31, 2026

Cloud Security Posture Management (CSPM) in Security Center automatically scans your cloud service configurations to identify and help you remediate potential configuration risks before they lead to security vulnerabilities or data breaches.

This topic covers:

  • Customizing check items (custom and predefined)

  • Setting up automatic detection policies and whitelist rules

  • Running scans and remediating failures

Prerequisites

Before you begin, make sure you have:

Configure check items

Security Center includes predefined check items for common configuration risks. Before running a scan, customize these items to align with your security baselines and reduce noise in the results.

Custom check items

Custom check items let you define detection logic based on your internal security standards or risk-specific scenarios.

Supported service providers: Alibaba Cloud, Tencent Cloud, and AWS

Detection scenarios: Compliance Risk, AISPM, and Security Risk. For details, see check rules.

How it works

The following diagram shows the workflow for configuring and using custom check items.

image

Create and publish a custom check item

  1. Go to the creation page. Log in to Security Center console - Risk Governance - CSPMSecurity Center console - Risk Governance - CSPM. In the top-left corner, select the region where your assets are located: Chinese Mainland or Outside Chinese Mainland. On the Cloud Service Configuration Risk tab, click Create Custom Check Item.

  2. Configure basic information. On the Basic Information Settings tab, configure the following parameters and click Next.

    ParameterDescription
    Check Item Category SettingsAssign the check item to one or more categories for easier filtering in reports. Click Add to assign multiple categories.
    Use caseThe top-level domain. Select Compliance Risk, AISPM, or Security Risk.
    Standard/Regulation/ChapterSelect a predefined option or enter a custom value from the drop-down list.
    Check Item DescriptionDescribe the check item: the service provider, the cloud service it targets, and a brief explanation of the rule.
    SolutionProvide the manual remediation steps to follow if the check detects a risk.
    HelpEnter a URL for a related help document, or enter None if unavailable.
    Risk LevelSet the risk level: High, Medium, or Low. For how risk levels are determined, see Assess risk levels.
  3. Define check item rules. On the Check Item Rule Settings tab, configure the following and click Next.

    • Check Item Target: Select the type of cloud service to check under the specified service provider, such as ECS-Instance or OSS-Bucket.

    • Associated Asset Settings (Optional): If the check logic involves related assets, click Add Associated Asset to link an asset type (such as a VPC) to the Check Item Target. > Note: If the Associable Attribute list is empty, the selected Check Item Target does not support asset association. Available options depend on what the console displays.

      Configure the following fields when adding an associated asset:

      FieldDescription
      Associable AttributeThe property of the Check Item Target used to link to another asset
      Associated AssetThe asset type to link
      Associated Asset PropertyThe property of the associated asset that maps to the Associable Attribute
    • Check Item Settings: Define the detection logic using conditions.

      Conditions follow AND/OR logic:

      ScopeRule
      Within a groupConnect conditions with AND or OR. Each group supports up to 10 conditions.
      Between groupsConnect groups with AND or OR. Each check item supports up to 5 groups.

      Example:With three groups and the relationship "group1 AND group2 OR group3" — group1 uses AND internally, group2 uses OR, and group3 uses AND:

      image

      Supported operators:

      OperatorDescription
      In / NotInChecks whether a value exists in a specified set
      Equals / NotEqualsChecks whether two values are equal
      Note: Click the image icon next to a parameter to view its data type, examples, and description.
      image
      1. Click Add Condition to expand the configuration area.

      2. Click Add Condition or Add Group to build the rule.

  4. Test the rule.

    1. Click Test on the Check Item Rule Settings tab.

    2. In the Test area, select a matching instance from your account (such as an OSS bucket, ECS instance, or Log Service project), then click Test.

    3. If The check item passed the check. appears, the configuration can parse the data correctly. If the result is unexpected, review your conditions and test again. image

    4. After the result is as expected, click Save.

    You can edit, publish, or delete a check item that is saved but not yet published.
  5. Publish the check item. Click Publish on the Check Item Rule Settings tab. Alternatively, go to the custom check item list and click Publish in the Actions column.

    Important

    - Only published check items appear in the check item list and are available for scans. - Published check items cannot be modified. To edit a published item, deactivate it first.

Manage custom check items

In the Custom Check Item Management section in the upper-right corner of the CSPM Risk page, you can view, edit, publish, unpublish, or delete custom check items.

ActionBehavior
EditClick the check item name to open its edit page. To modify a published check item, first click Deactivate to make it editable.
UnpublishPermanently deletes the item's associated rules and all historical scan results. This action is irreversible.
DeletePermanently removes the check item along with its historical check data and alert information.

Predefined check items

For predefined check items that support customization — such as checks for OSS bucket hotlink protection, idle users, or password expiration — you can modify their parameters to match your security baselines.

Requirement: A paid edition of CSPM. See Activate a paid edition of CSPM.

  1. Go to Security Center console - Risk Governance - CSPMSecurity Center console - Risk Governance - CSPM. In the top-left corner, select the region where your assets are located.

  2. On the Cloud Service Configuration Risk tab, find a check item where the Support Custom Parameters column shows Yes, then click its name.

  3. In the details panel, click Parameter Configuration.

    If this button does not appear, the check item does not support parameter modification.
  4. In the Parameter Configuration panel, click Add Modifiable Parameter in the Modifiable Parameter column and select the parameter to modify from the drop-down list.

  5. Enter the new value in the Edit Parameter column and click OK.

The modified parameter takes effect during the next scan.

Configure check policies

After configuring check items, set up detection policies and whitelist rules to control the scope, schedule, and exceptions for your scans.

Automatic detection policy

  1. On the Risk Governance > Cloud Service Configuration Risk page, click Policy Management in the upper-right corner, then go to the Cloud Service Scan Policy tab.

  2. Turn on the Automatic CSPM Check switch and configure the following settings:

    SettingDescription
    Check CycleHow frequently the scan runs
    Check AtThe specific time for the scan to start
    Check Item SelectionThe predefined or published custom check items to include
  3. After selecting check items, the Estimated Quota Consumption for a single scan appears above the list.

    This estimate is for reference only. The actual number of scanned instances may vary.
  4. Security Center runs configuration risk scans on your defined schedule automatically.

Whitelist rules

Use whitelist rules to exclude specific check items for designated cloud service instances, preventing unnecessary risk alerts. Whitelist rules apply to both scheduled and on-demand scans.

Create a whitelist rule

  1. On the Risk Governance > Cloud Service Configuration Risk page, click Policy Management in the upper-right corner.

  2. On the Whitelist Rule > By Check Item tab, click Create Whitelist Rule.

  3. In the panel, configure the following and click OK: Policy Effective Scope options:

    Important

    Exempting all instances is a high-risk operation — new security risks on future instances can go undetected. Use Specific Instances for precise whitelisting, and audit your whitelist rules periodically to confirm they are still necessary.

    ParameterDescription
    Check ItemThe check items to exclude from scans. See check rules.
    Policy Effective ScopeThe scope of the exemption.
    OptionBehavior
    All InstancesExempts all existing and future instances of this cloud service from the check. Related risks are not displayed in the risk list.
    Specific InstancesApplies the exemption only to the selected instances. New instances are still scanned.

Manage whitelist rules

  • Edit or delete rules: Whitelist rules you create appear in the By Check Item list. Click Edit to modify the scope, or Delete to remove the exemption.

  • Automatic synchronization: When you manually mark a failed check item as handled or whitelisted while handling risks, the system automatically adds the corresponding rule to this list. For details, see Handle cloud services that fail check items.

Run configuration risk scans

Security Center supports two scan modes:

ModeDescription
Scheduled automatic scansRuns on the schedule defined in your automatic detection policy
On-demand scansTriggered manually at any time

Run an on-demand scan:

  1. On the Cloud Service Configuration Risk tab, click Scan Now in the Actions area.

  2. Select a scan mode:

    ModeWhat it scans
    Full ScanAll supported cloud services and check items, including predefined and custom
    Scan By PolicyOnly the check items selected in Policy Management

After the scan completes, view all failed check items in the Cloud Service Configuration Risk list and follow each item's Solution to remediate them.

Remediate failed check items

After a scan, go to Risk Governance > CSPM Risk > Cloud Service Configuration Risk to view all failed check items and follow the provided Solution to remediate each risk.

For step-by-step guidance, see View and handle failed check items.

FAQ

What should I do if I find a logic error in a published custom check item?

Deactivate the check item first: in the upper-right corner of the CSPM Risk page, click Custom Check Item Management, find the item, and select Deactivate.

Warning

Unpublishing a check item permanently deletes all of its historical scan results. This action is irreversible.

After modifying and testing the rule, click Publish to make it active again.

How can I find the custom check items I created?

On the Cloud Service Configuration Risk tab of the Risk Governance > CSPM Risk page, your custom check items are grouped under the categories you assigned during creation.

image