{"id":10157,"date":"2026-05-12T14:28:51","date_gmt":"2026-05-12T14:28:51","guid":{"rendered":"https:\/\/cyberwatch.fr\/?p=10157"},"modified":"2026-05-12T15:10:42","modified_gmt":"2026-05-12T15:10:42","slug":"cspm-cloud-security-posture-management","status":"publish","type":"post","link":"https:\/\/cyberwatch.fr\/en\/news\/cspm-cloud-security-posture-management\/","title":{"rendered":"CSPM (Cloud Security Posture Management): what it is, why it matters, and how to implement it with Cyberwatch"},"content":{"rendered":"\n<p>In 2024, organizations experienced an average of nine cloud security incidents, and nearly nine in ten report the number keeps climbing year over year (source: <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2025\/11\/06\/new-idc-research-highlights-a-major-cloud-security-shift\/\" target=\"_blank\" rel=\"noreferrer noopener\">IDC \/ Microsoft study<\/a>).<\/p>\n\n\n\n<p>The takeaway is simple: every new cloud resource expands the attack surface. And some of the riskiest issues fly completely under the radar. A Security Group patched in a hurry during a debugging session and never locked back down can quietly leave a service exposed for months, with no one the wiser.<\/p>\n\n\n\n<p>That&#8217;s precisely the kind of quiet, easy-to-miss misconfiguration <strong>CSPM (Cloud Security Posture Management)<\/strong> was built to catch. It continuously inventories exposed resources, surfaces configuration gaps, prioritizes risk, and drives remediation before small oversights spiral into serious incidents.<\/p>\n\n\n\n<p>In this article, we break down what CSPM really means, why it&#8217;s become a must-have, and how Cyberwatch helps you put it into practice, covering workload protection (CWPP) and container security as part of a<strong> full CNAPP strategy<\/strong>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>What is CSPM and why has it become essential?<\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Definition and core principles<\/strong><\/h3>\n\n\n\n<p>CSPM is a cybersecurity approach designed to continuously assess, monitor, and improve the security posture of cloud environments.<\/p>\n\n\n\n<p>Its core premise: <strong>ensuring that an organization&#8217;s cloud resources are properly configured, exposed only as much as necessary, and aligned with security best practices.<\/strong><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>What cloud exposure actually covers<\/strong><\/h3>\n\n\n\n<p>An organization&#8217;s cloud footprint is far broader than a simple inventory of virtual machines.<\/p>\n\n\n\n<p>It spans every resource deployed across cloud providers (AWS, Azure, GCP, OpenStack), including:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The configurations tied to each service<\/li>\n\n\n\n<li>Identities and access rights<\/li>\n\n\n\n<li>Data stored in the cloud (S3 buckets, managed databases, backups, Azure Blob storage&#8230;)<\/li>\n\n\n\n<li>Resources exposed to the internet, sometimes unintentionally<\/li>\n\n\n\n<li>Network settings (security rules, subnets, interconnections)<\/li>\n\n\n\n<li>Applied security controls (encryption, authentication, logging)<\/li>\n<\/ul>\n\n\n\n<p>Cloud exposure, then, covers <strong>anything in your environment that could be accessible, misconfigured, or inadequately protected<\/strong>, particularly when measured against established security frameworks like the CIS Benchmarks.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Why the cloud creates new blind spots<\/strong><\/h3>\n\n\n\n<p>Unlike on-premises infrastructure, <strong>cloud environments are neither static nor centralized<\/strong>. The widespread adoption of multicloud, whether public, private, or hybrid, multiplies entry points and fragments visibility: resources are spread across multiple platforms, each with its own management model.<\/p>\n\n\n\n<p>But what really compounds the problem is speed. <strong>Modern architectures\u2014 containers, Kubernetes, CI\/CD pipelines\u2014 spin up resources with lifecycles measured in minutes, sometimes seconds.<\/strong><\/p>\n\n\n\n<p>A Kubernetes pod can appear, get exposed, and disappear before it&#8217;s ever been inventoried. An image automatically pushed through a CI\/CD pipeline can introduce a vulnerability before any team has had a chance to catch it.<\/p>\n\n\n\n<p>On top of that dynamic complexity, there are more familiar but no less critical blind spots:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Test environments left running long after they&#8217;re needed<\/li>\n\n\n\n<li>Access rights that accumulate without regular review<\/li>\n\n\n\n<li>Shadow IT that flies completely under the security team&#8217;s radar<\/li>\n<\/ul>\n\n\n\n<p>Without a dedicated tool, maintaining a reliable, current picture of what&#8217;s actually exposed becomes impossible.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Mounting regulatory pressure<\/strong><\/h3>\n\n\n\n<p>Alongside these technical challenges, the regulatory environment is tightening fast. The <strong>NIS2 directive<\/strong>, in effect since October 2024, mandates stronger cyber risk management obligations with penalties reaching up to 2% of global annual revenue.<\/p>\n\n\n\n<p><strong>ISO 27001, GDPR, SecNumCloud: <\/strong>the frameworks that directly govern cloud security keep multiplying, and they now demand continuous traceability, well beyond the annual audit.<\/p>\n\n\n\n<p>In this context, CSPM has become as much a <strong>compliance tool as an operational security one.<\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>CSPM in practice: the 4 core functions<\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>1) Automated cloud asset inventory<\/strong><\/h3>\n\n\n\n<p>You can&#8217;t secure what you can&#8217;t see.<\/p>\n\n\n\n<p>The first function of CSPM is to <strong>automatically identify every asset deployed in the cloud<\/strong>\u2014 virtual machines, containers, managed services, storage accounts, network resources\u2014 regardless of provider.<\/p>\n\n\n\n<p>This inventory needs to be dynamic: a resource spun up today should appear in the monitored scope with no manual intervention required. That&#8217;s the non-negotiable baseline for keeping an accurate map in environments where deployments happen around the clock.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>2) Risk detection and prioritization<\/strong><\/h3>\n\n\n\n<p>Once assets are identified, CSPM solutions<strong> analyze their real-world exposure.<\/strong> That means detecting known vulnerabilities (CVEs) as well as flagging misconfigurations: an unnecessarily open port, a deprecated protocol, an unprotected access key.<\/p>\n\n\n\n<p>But detection alone isn&#8217;t enough: you need to know <strong>what to fix first<\/strong>.<\/p>\n\n\n\n<p>In cloud environments where vulnerabilities number in the thousands, prioritizing by raw CVSS scores alone doesn&#8217;t cut it. Context has to be factored in: the business criticality of the asset, its network exposure, and the actual likelihood that a given flaw will be exploited.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>3) Continuous compliance monitoring<\/strong><\/h3>\n\n\n\n<p>CSPM continuously <strong>checks cloud resource configurations against recognized security frameworks<\/strong>, most notably the <strong>CIS Benchmarks<\/strong>, as well as an organization&#8217;s own internal policies.<\/p>\n\n\n\n<p>This ongoing monitoring is critical: a configuration that passes today may fail tomorrow after an update, a manual change, or a new deployment. The annual audit just doesn&#8217;t cut it anymore.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>4) Remediation and patch orchestration<\/strong><\/h3>\n\n\n\n<p>The last function of CSPM is <strong>turning detection into action<\/strong>. That means delivering precise, actionable guidance: not just flagging an anomaly, but specifying exactly which version to patch, which configuration to change, which access to revoke.<\/p>\n\n\n\n<p>In modern environments, remediation needs to slot cleanly into existing workflows: connecting to ticketing systems, patch management platforms, and IT team processes without creating extra friction.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>CSPM with Cyberwatch: from discovery to remediation<\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Multi-cloud discovery (AWS, Azure, GCP, OpenStack)<\/strong><\/h3>\n\n\n\n<p>Visibility into cloud assets is the foundation of any CSPM strategy. Cyberwatch delivers it through native discovery mechanisms that automatically identify machines deployed across major cloud providers.<\/p>\n\n\n\n<p>In practice:<\/p>\n\n\n\n<p><a href=\"https:\/\/docs.cyberwatch.com\/help\/en\/use_assets\/amazon_ec2_discoveries\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>AWS Discoveries<\/strong><\/a><strong>:<\/strong> Cyberwatch queries the Amazon EC2 API directly to list all instances and their metadata (ID, IP, state, tags). It uses an IAM role with read-only permissions, in strict adherence to the principle of least privilege. Discovery can also be segmented by IAM role to isolate environments.<\/p>\n\n\n\n<p><a href=\"https:\/\/docs.cyberwatch.com\/help\/en\/use_assets\/azure_discoveries\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Azure Discoveries<\/strong><\/a><strong>:<\/strong> Via the Azure Resource Manager API, Cyberwatch inventories virtual machines and their attributes (name, IP, resource group) using a service account with read access to compute resources.<\/p>\n\n\n\n<p><a href=\"https:\/\/docs.cyberwatch.com\/help\/en\/use_assets\/google_discoveries\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Google Cloud Platform Discoveries<\/strong><\/a><strong>:<\/strong> Discovery runs through the GCP API, listing VMs and their metadata (zone, IP, state) via a service account with read access to Compute Engine.<\/p>\n\n\n\n<p><a href=\"https:\/\/docs.cyberwatch.com\/help\/en\/use_assets\/openstack_discoveries\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>OpenStack Discoveries<\/strong><\/a><strong>:<\/strong> For private infrastructure, Cyberwatch connects to the OpenStack API to retrieve instances and their properties, particularly useful for organizations running a mix of public and private cloud.<\/p>\n\n\n\n<p>Beyond API-based discovery, Cyberwatch also supports connection methods suited to specific cloud contexts. For an AWS instance, a standard SSH connector can be paired with <a href=\"https:\/\/docs.cyberwatch.com\/help\/en\/use_assets\/agentless_connections\/AWS_SSM_guide\/\" target=\"_blank\" rel=\"noreferrer noopener\">AWS Systems Manager (SSM) access<\/a>, enabling interaction with machines that have no direct network exposure, which strengthens both security and operational flexibility.<\/p>\n\n\n\n<p>Creating a cloud project asset also triggers an automatic inventory of all associated managed services and resources: storage services (S3, Cloud Storage), managed databases (RDS), network resources, IAM users and roles.<\/p>\n\n\n\n<p>All of these assets\u2014 virtual machines, managed services, identities\u2014 are consolidated into a comprehensive, continuously updated inventory. This is the essential prerequisite for any CSPM strategy: without full visibility, exposed or misconfigured resources can slip through the cracks, and the attack surface can never be truly controlled.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>3D prioritization: CVSS-BTE, EPSS, CISA KEV<\/strong><\/h3>\n\n\n\n<p>Cyberwatch doesn&#8217;t just detect vulnerabilities. It prioritizes them through a three-dimensional, context-aware approach.<\/p>\n\n\n\n<p>Prioritization is built on a criticality policy defined per asset, based on its specific security requirements (Confidentiality, Integrity, Availability). This policy applies the environmental metrics from the CVSS standard (v2, v3, v4) to calculate an adjusted score, the <strong>CVSS-BTE<\/strong>, which reflects both the intrinsic severity of a vulnerability and its potential impact on the affected asset.<\/p>\n\n\n\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;6a0394aa4e17b&quot;}\" data-wp-interactive=\"core\/image\" data-wp-key=\"6a0394aa4e17b\" class=\"wp-block-image aligncenter size-large wp-lightbox-container\"><img decoding=\"async\" width=\"1024\" height=\"522\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on--click=\"actions.showLightbox\" data-wp-on--load=\"callbacks.setButtonStyles\" data-wp-on-window--resize=\"callbacks.setButtonStyles\" src=\"https:\/\/cyberwatch.fr\/wp-content\/uploads\/2026\/05\/CVE-2026-20963-en-1024x522.png\" alt=\"\" class=\"wp-image-10160\" srcset=\"https:\/\/cyberwatch.fr\/wp-content\/uploads\/2026\/05\/CVE-2026-20963-en-980x500.png 980w, https:\/\/cyberwatch.fr\/wp-content\/uploads\/2026\/05\/CVE-2026-20963-en-480x245.png 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1024px, 100vw\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><\/figure>\n\n\n\n<p>In practice, a server fully isolated from the network may see the criticality of its remotely exploitable vulnerabilities automatically downgraded. A flaw affecting an internet-facing production system, on the other hand, stays high priority.<\/p>\n\n\n\n<p>This contextualization is backed by two additional signals:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The <strong>EPSS score<\/strong>, which reflects the real-world probability of exploitation<\/li>\n\n\n\n<li><strong>Presence in authoritative catalogs such as CISA KEV or CERT-FR ALE<\/strong>, which flag actively exploited vulnerabilities<\/li>\n<\/ul>\n\n\n\n<p>The result: risk isn&#8217;t assessed as an abstract severity rating, but as actual exposure for a specific asset.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>CIS Benchmark compliance for cloud environments<\/strong><\/h3>\n\n\n\n<p>Cyberwatch <strong>continuously monitors cloud configurations against the CIS Benchmarks<\/strong>, covering AWS, Microsoft Azure, Google Cloud Platform, and Microsoft 365. In practice, that means hundreds of hardening rules verified automatically and on an ongoing basis.<\/p>\n\n\n\n<p>A few concrete examples:<\/p>\n\n\n\n<p><strong>Microsoft Azure:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>CIS-Azure-4.1: Secure transfer required enabled on storage accounts<\/li>\n\n\n\n<li>CIS-Azure-4.4: Periodic regeneration of Storage Account access keys<\/li>\n\n\n\n<li>CIS-Azure-4.6: Public Network Access disabled for storage accounts<\/li>\n\n\n\n<li>CIS-Azure-7.1: RDP access from the internet assessed and restricted<\/li>\n<\/ul>\n\n\n\n<p><strong>Google Cloud Platform:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>CIS-GCP-3.1: Default network removed from projects<\/li>\n\n\n\n<li>CIS-GCP-3.3: DNSSEC enabled for Cloud DNS<\/li>\n\n\n\n<li>CIS-GCP-4.1: Default service account not used on instances<\/li>\n\n\n\n<li>CIS-GCP-4.3: Project-wide SSH key blocking enabled for VMs<\/li>\n<\/ul>\n\n\n\n<p><strong>AWS:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>CIS-AWS-1.4: No access keys present on the root account<\/li>\n\n\n\n<li>CIS-AWS-1.5: MFA enabled for the root account<\/li>\n\n\n\n<li>CIS-AWS-1.8: Password policy enforcing a minimum length of 14 characters<\/li>\n\n\n\n<li>CIS-AWS-1.12: Dedicated support role created for secure incident management<\/li>\n<\/ul>\n\n\n\n<p>Beyond standard frameworks, Cyberwatch also supports custom rules tailored to each organization&#8217;s internal policies.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Built-in remediation and ITSM integrations<\/strong><\/h3>\n\n\n\n<p>Cyberwatch delivers <strong>precise remediation guidance based on official vendor advisories<\/strong>. Each recommendation specifies the patched version or fix to apply, accounting for system-specific details, including distribution-specific branches for Linux.<\/p>\n\n\n\n<p>For implementation, the platform leverages native system mechanisms:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Linux: package managers (APT, YUM, DNF) to apply patches<\/li>\n\n\n\n<li>Windows: Windows Update to deploy the required KBs<\/li>\n\n\n\n<li>Third-party Microsoft products: winget to install or update applications<\/li>\n<\/ul>\n\n\n\n<p>Cyberwatch also integrates with existing IT tooling: patch management solutions (WAPT, Ivanti, Intune) and ticketing platforms (ServiceNow, Jira, GLPI). A validated vulnerability can automatically generate a pre-populated ticket with full context: affected asset, criticality level, recommended fix.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>From CSPM to CNAPP: how Cyberwatch unifies cloud security<\/strong><\/h2>\n\n\n\n<p>Cyberwatch fully covers the needs of a modern CSPM, but it doesn&#8217;t stop there.<\/p>\n\n\n\n<p>Today&#8217;s cloud environments go well beyond virtual machines: containers, Kubernetes clusters, CI\/CD pipelines, and hybrid workloads coexist in increasingly complex architectures.<\/p>\n\n\n\n<p>To address this, Cyberwatch incorporates <strong>CWPP (Cloud Workload Protection Platform) <\/strong>capabilities, laying the foundation for a truly unified <strong>CNAPP (Cloud-Native Application Protection Platform)<\/strong> strategy.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Workload protection with CWPP<\/strong><\/h3>\n\n\n\n<p>CWPP focuses on protecting workloads\u2014 virtual machines, servers, containers, infrastructure components\u2014 against vulnerabilities, misconfigurations, and the threats that follow from them.<\/p>\n\n\n\n<p>Where CSPM addresses cloud posture, CWPP goes deeper into the workloads themselves, whether they run in the cloud, on-premises, or in hybrid environments.<\/p>\n\n\n\n<p>Cyberwatch brings inventory, classification, and analysis of all workloads into a single platform, regardless of type or location:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>On-premises infrastructure:<\/strong> hypervisors, servers, network appliances, through dedicated discovery covering VMware vSphere\/ESXi, Microsoft Hyper-V, Proxmox, Nutanix, Active Directory, Fortinet, Stormshield, and more<\/li>\n\n\n\n<li><strong>Public cloud:<\/strong> AWS, Azure, GCP, OpenStack, using the same discovery mechanisms described in the CSPM section<\/li>\n\n\n\n<li><strong>Internet exposure:<\/strong> through DNS enumeration, Certificate Transparency, and WHOIS data, Cyberwatch surfaces publicly exposed domains, services, and machines, including ones that are poorly documented or simply forgotten, which can represent a significant attack surface<\/li>\n<\/ul>\n\n\n\n<p>This comprehensive approach gives organizations a clear picture of their real exposure, regardless of where workloads run.<\/p>\n\n\n\n<p>That visibility is backed by deep analysis capabilities <a href=\"https:\/\/docs.cyberwatch.com\/help\/en\/use_vulnerability_scanner\/supported_software\/\" target=\"_blank\" rel=\"noreferrer noopener\">across more than 80,000 technologies<\/a>. Cyberwatch inspects operating systems, application dependencies (Pip, npm, Gem&#8230;), and components embedded in containers, delivering a consistent level of analysis whether a workload lives in the cloud or on-premises.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Container and Kubernetes security<\/strong><\/h3>\n\n\n\n<p>Cyberwatch analyzes containers through a two-stage approach. Since a Docker image is typically built around a minimal OS environment hosting an application component, the platform starts by <strong>scanning all packages in the underlying operating system<\/strong>. This first layer surfaces vulnerabilities affecting the image&#8217;s system base.<\/p>\n\n\n\n<p>It then goes a level deeper, <strong>detecting the application&#8217;s software dependencies<\/strong>: libraries, runtimes, and packages from ecosystems like Pip, Gem, or npm.<\/p>\n\n\n\n<p>This dual approach simultaneously surfaces OS-level vulnerabilities and those introduced by application components.<\/p>\n\n\n\n<p>Beyond the image itself, <strong>Cyberwatch extends coverage to runtime environments<\/strong>. The platform handles discovery and inventory of Kubernetes clusters (AKS, EKS, OpenShift, Rancher), Docker Swarm, and image registries (Amazon ECR, Harbor, GitLab Registry). Newly deployed images can be scanned automatically, ensuring continuous oversight throughout the containerized workload lifecycle.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>DevSecOps and CI\/CD integration<\/strong><\/h3>\n\n\n\n<p><strong>Cyberwatch integrates natively <\/strong><a href=\"https:\/\/cyberwatch.fr\/en\/news\/switch-to-a-devsecops-approach-with-cyberwatch\/\"><strong>into DevSecOps workflows<\/strong><\/a> through built-in support for Harbor scanner integration and direct insertion into GitLab CI\/CD pipelines. This shifts security left: non-compliant or vulnerable images can be blocked before they ever reach production.<\/p>\n\n\n\n<p>That&#8217;s the whole logic of CNAPP: cloud posture, workload protection, and container security are no longer handled in silos, but as part of a coherent, automated continuum, from initial inventory all the way through to remediation.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Summary<\/strong><\/h2>\n\n\n\n<p>In 2026, multicloud has gone mainstream. Yet many organizations still lack a reliable, current picture of what&#8217;s actually running in their cloud environment, or what&#8217;s genuinely exposed.<\/p>\n\n\n\n<p>CSPM addresses that gap directly: continuously identifying cloud resources, detecting misconfigurations, prioritizing real risk, and driving remediation. At this point, it&#8217;s not optional. It&#8217;s table stakes for any organization serious about security.<\/p>\n\n\n\n<p>With Cyberwatch, that approach becomes fully operational:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>A centralized, continuously updated automated inventory of all your cloud resources (AWS, Azure, GCP, OpenStack)<\/li>\n\n\n\n<li>Context-aware vulnerability prioritization based on CVSS-BTE, EPSS, and the CISA KEV and CERT-FR ALE catalogs, so effort goes where risk is real<\/li>\n\n\n\n<li>Continuous compliance monitoring via CIS Benchmarks for AWS, Azure, GCP, and Microsoft 365<\/li>\n\n\n\n<li>Integrated, traceable remediation connected to your existing tools (ServiceNow, Jira, GLPI, Intune&#8230;)<\/li>\n\n\n\n<li>Full coverage extending to workloads, containers, and Kubernetes clusters, for a truly unified CNAPP approach<\/li>\n<\/ul>\n\n\n\n<p><a href=\"https:\/\/cyberwatch.fr\/en\/contact\/\">Request a free demo<\/a> and get a concrete assessment of your cloud exposure.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>FAQ<\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>What&#8217;s the difference between CSPM and a traditional vulnerability scanner?<\/strong><\/h3>\n\n\n\n<p>A traditional vulnerability scanner analyzes the assets you explicitly point it at. CSPM goes further: it automatically discovers all your cloud resources, including ones you don&#8217;t know about, analyzes their configurations, and monitors for compliance on an ongoing basis, not just at the moment of a scan.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>What&#8217;s the difference between CSPM and CWPP?<\/strong><\/h3>\n\n\n\n<p>CSPM focuses on the posture and configurations of cloud environments. CWPP (Cloud Workload Protection Platform) goes deeper, down to the workloads themselves\u2014 virtual machines, servers, containers\u2014 analyzing and protecting them against vulnerabilities and misconfigurations, whether they run in the cloud, on-premises, or in hybrid environments.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Does CSPM help meet NIS2 requirements?<\/strong><\/h3>\n\n\n\n<p>Yes. Article 21 of the NIS2 directive requires covered entities to implement a range of cyber risk management measures, including vulnerability management, configuration controls, supply chain security, and traceability of remediation actions. CSPM directly addresses several of these: continuous asset inventory, misconfiguration detection, context-aware vulnerability prioritization, and patch tracking. It also generates the evidence needed in the event of an audit or review by the relevant authority.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Is CSPM only for large enterprises with complex multicloud environments?<\/strong><\/h3>\n\n\n\n<p>Historically, yes, but modern solutions have become far more accessible. Cyberwatch, for example, is built to scale across large organizations and mid-sized businesses alike, with fast deployment and straightforward integration into existing tooling.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>What&#8217;s the difference between CSPM and CNAPP?<\/strong><\/h3>\n\n\n\n<p>CSPM focuses on cloud posture and configurations. CNAPP is a broader approach that builds on CSPM and adds workload protection, container security, and DevSecOps integration. CSPM is a core building block of CNAPP, but CNAPP goes further.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>How does CSPM fit into a DevSecOps approach?<\/strong><\/h3>\n\n\n\n<p>By shifting security controls as early as possible in the development cycle: scanning container images before deployment, blocking vulnerable images in the CI\/CD pipeline, and integrating with team tooling (GitLab, Harbor&#8230;). The goal is to make security a continuous part of the application lifecycle, not a final checkpoint.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In 2024, organizations experienced an average of nine cloud security incidents, and nearly nine in ten report the number keeps climbing year over year (source: IDC \/ Microsoft study). The takeaway is simple: every new cloud resource expands the attack surface. And some of the riskiest issues fly completely under the radar. A Security Group [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":10166,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[29],"tags":[],"class_list":["post-10157","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>CSPM: secure your cloud environments with Cyberwatch<\/title>\n<meta name=\"description\" content=\"Learn how CSPM, CWPP, and CNAPP help secure multicloud environments and workloads through continuous, unified protection with Cyberwatch.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cyberwatch.fr\/en\/news\/cspm-cloud-security-posture-management\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CSPM: secure your cloud environments with Cyberwatch\" \/>\n<meta property=\"og:description\" content=\"Learn how CSPM, CWPP, and CNAPP help secure multicloud environments and workloads through continuous, unified protection with Cyberwatch.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cyberwatch.fr\/en\/news\/cspm-cloud-security-posture-management\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyberwatch\" \/>\n<meta property=\"article:published_time\" content=\"2026-05-12T14:28:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-05-12T15:10:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cyberwatch.fr\/wp-content\/uploads\/2026\/05\/thumbnail-CSPM.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1953\" \/>\n\t<meta property=\"og:image:height\" content=\"1016\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"cyberwatch\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"cyberwatch\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"14 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/cyberwatch.fr\\\/en\\\/news\\\/cspm-cloud-security-posture-management\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cyberwatch.fr\\\/en\\\/news\\\/cspm-cloud-security-posture-management\\\/\"},\"author\":{\"name\":\"cyberwatch\",\"@id\":\"https:\\\/\\\/cyberwatch.fr\\\/en\\\/#\\\/schema\\\/person\\\/293954835744eee8267f0877f4e01d7a\"},\"headline\":\"CSPM (Cloud Security Posture Management): what it is, why it matters, and how to implement it with Cyberwatch\",\"datePublished\":\"2026-05-12T14:28:51+00:00\",\"dateModified\":\"2026-05-12T15:10:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/cyberwatch.fr\\\/en\\\/news\\\/cspm-cloud-security-posture-management\\\/\"},\"wordCount\":2577,\"publisher\":{\"@id\":\"https:\\\/\\\/cyberwatch.fr\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/cyberwatch.fr\\\/en\\\/news\\\/cspm-cloud-security-posture-management\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cyberwatch.fr\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/thumbnail-CSPM.png\",\"articleSection\":[\"news\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/cyberwatch.fr\\\/en\\\/news\\\/cspm-cloud-security-posture-management\\\/\",\"url\":\"https:\\\/\\\/cyberwatch.fr\\\/en\\\/news\\\/cspm-cloud-security-posture-management\\\/\",\"name\":\"CSPM: secure your cloud environments with Cyberwatch\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cyberwatch.fr\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/cyberwatch.fr\\\/en\\\/news\\\/cspm-cloud-security-posture-management\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/cyberwatch.fr\\\/en\\\/news\\\/cspm-cloud-security-posture-management\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cyberwatch.fr\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/thumbnail-CSPM.png\",\"datePublished\":\"2026-05-12T14:28:51+00:00\",\"dateModified\":\"2026-05-12T15:10:42+00:00\",\"description\":\"Learn how CSPM, CWPP, and CNAPP help secure multicloud environments and workloads through continuous, unified protection with Cyberwatch.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/cyberwatch.fr\\\/en\\\/news\\\/cspm-cloud-security-posture-management\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/cyberwatch.fr\\\/en\\\/news\\\/cspm-cloud-security-posture-management\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/cyberwatch.fr\\\/en\\\/news\\\/cspm-cloud-security-posture-management\\\/#primaryimage\",\"url\":\"https:\\\/\\\/cyberwatch.fr\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/thumbnail-CSPM.png\",\"contentUrl\":\"https:\\\/\\\/cyberwatch.fr\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/thumbnail-CSPM.png\",\"width\":1953,\"height\":1016},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/cyberwatch.fr\\\/en\\\/news\\\/cspm-cloud-security-posture-management\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/cyberwatch.fr\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CSPM (Cloud Security Posture Management): what it is, why it matters, and how to implement it with Cyberwatch\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/cyberwatch.fr\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/cyberwatch.fr\\\/en\\\/\",\"name\":\"Cyberwatch\",\"description\":\"Supervisez vos vuln\u00e9rabilit\u00e9s. Contr\u00f4lez vos conformit\u00e9s.\",\"publisher\":{\"@id\":\"https:\\\/\\\/cyberwatch.fr\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/cyberwatch.fr\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/cyberwatch.fr\\\/en\\\/#organization\",\"name\":\"Cyberwatch\",\"url\":\"https:\\\/\\\/cyberwatch.fr\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/cyberwatch.fr\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/cyberwatch.fr\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/logo_simple_black.png\",\"contentUrl\":\"https:\\\/\\\/cyberwatch.fr\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/logo_simple_black.png\",\"width\":1883,\"height\":500,\"caption\":\"Cyberwatch\"},\"image\":{\"@id\":\"https:\\\/\\\/cyberwatch.fr\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/cyberwatch.fr\\\/en\\\/#\\\/schema\\\/person\\\/293954835744eee8267f0877f4e01d7a\",\"name\":\"cyberwatch\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/101313e5d1b026340734cf30d8a7384c2f1121b0ec2abca7b34cec6975ffb5fd?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/101313e5d1b026340734cf30d8a7384c2f1121b0ec2abca7b34cec6975ffb5fd?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/101313e5d1b026340734cf30d8a7384c2f1121b0ec2abca7b34cec6975ffb5fd?s=96&d=mm&r=g\",\"caption\":\"cyberwatch\"},\"sameAs\":[\"https:\\\/\\\/cyberwatch.fr\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CSPM: secure your cloud environments with Cyberwatch","description":"Learn how CSPM, CWPP, and CNAPP help secure multicloud environments and workloads through continuous, unified protection with Cyberwatch.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cyberwatch.fr\/en\/news\/cspm-cloud-security-posture-management\/","og_locale":"en_US","og_type":"article","og_title":"CSPM: secure your cloud environments with Cyberwatch","og_description":"Learn how CSPM, CWPP, and CNAPP help secure multicloud environments and workloads through continuous, unified protection with Cyberwatch.","og_url":"https:\/\/cyberwatch.fr\/en\/news\/cspm-cloud-security-posture-management\/","og_site_name":"Cyberwatch","article_published_time":"2026-05-12T14:28:51+00:00","article_modified_time":"2026-05-12T15:10:42+00:00","og_image":[{"width":1953,"height":1016,"url":"https:\/\/cyberwatch.fr\/wp-content\/uploads\/2026\/05\/thumbnail-CSPM.png","type":"image\/png"}],"author":"cyberwatch","twitter_card":"summary_large_image","twitter_misc":{"Written by":"cyberwatch","Est. reading time":"14 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cyberwatch.fr\/en\/news\/cspm-cloud-security-posture-management\/#article","isPartOf":{"@id":"https:\/\/cyberwatch.fr\/en\/news\/cspm-cloud-security-posture-management\/"},"author":{"name":"cyberwatch","@id":"https:\/\/cyberwatch.fr\/en\/#\/schema\/person\/293954835744eee8267f0877f4e01d7a"},"headline":"CSPM (Cloud Security Posture Management): what it is, why it matters, and how to implement it with Cyberwatch","datePublished":"2026-05-12T14:28:51+00:00","dateModified":"2026-05-12T15:10:42+00:00","mainEntityOfPage":{"@id":"https:\/\/cyberwatch.fr\/en\/news\/cspm-cloud-security-posture-management\/"},"wordCount":2577,"publisher":{"@id":"https:\/\/cyberwatch.fr\/en\/#organization"},"image":{"@id":"https:\/\/cyberwatch.fr\/en\/news\/cspm-cloud-security-posture-management\/#primaryimage"},"thumbnailUrl":"https:\/\/cyberwatch.fr\/wp-content\/uploads\/2026\/05\/thumbnail-CSPM.png","articleSection":["news"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/cyberwatch.fr\/en\/news\/cspm-cloud-security-posture-management\/","url":"https:\/\/cyberwatch.fr\/en\/news\/cspm-cloud-security-posture-management\/","name":"CSPM: secure your cloud environments with Cyberwatch","isPartOf":{"@id":"https:\/\/cyberwatch.fr\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cyberwatch.fr\/en\/news\/cspm-cloud-security-posture-management\/#primaryimage"},"image":{"@id":"https:\/\/cyberwatch.fr\/en\/news\/cspm-cloud-security-posture-management\/#primaryimage"},"thumbnailUrl":"https:\/\/cyberwatch.fr\/wp-content\/uploads\/2026\/05\/thumbnail-CSPM.png","datePublished":"2026-05-12T14:28:51+00:00","dateModified":"2026-05-12T15:10:42+00:00","description":"Learn how CSPM, CWPP, and CNAPP help secure multicloud environments and workloads through continuous, unified protection with Cyberwatch.","breadcrumb":{"@id":"https:\/\/cyberwatch.fr\/en\/news\/cspm-cloud-security-posture-management\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cyberwatch.fr\/en\/news\/cspm-cloud-security-posture-management\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cyberwatch.fr\/en\/news\/cspm-cloud-security-posture-management\/#primaryimage","url":"https:\/\/cyberwatch.fr\/wp-content\/uploads\/2026\/05\/thumbnail-CSPM.png","contentUrl":"https:\/\/cyberwatch.fr\/wp-content\/uploads\/2026\/05\/thumbnail-CSPM.png","width":1953,"height":1016},{"@type":"BreadcrumbList","@id":"https:\/\/cyberwatch.fr\/en\/news\/cspm-cloud-security-posture-management\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cyberwatch.fr\/en\/"},{"@type":"ListItem","position":2,"name":"CSPM (Cloud Security Posture Management): what it is, why it matters, and how to implement it with Cyberwatch"}]},{"@type":"WebSite","@id":"https:\/\/cyberwatch.fr\/en\/#website","url":"https:\/\/cyberwatch.fr\/en\/","name":"Cyberwatch","description":"Supervisez vos vuln\u00e9rabilit\u00e9s. Contr\u00f4lez vos conformit\u00e9s.","publisher":{"@id":"https:\/\/cyberwatch.fr\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cyberwatch.fr\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/cyberwatch.fr\/en\/#organization","name":"Cyberwatch","url":"https:\/\/cyberwatch.fr\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cyberwatch.fr\/en\/#\/schema\/logo\/image\/","url":"https:\/\/cyberwatch.fr\/wp-content\/uploads\/2021\/04\/logo_simple_black.png","contentUrl":"https:\/\/cyberwatch.fr\/wp-content\/uploads\/2021\/04\/logo_simple_black.png","width":1883,"height":500,"caption":"Cyberwatch"},"image":{"@id":"https:\/\/cyberwatch.fr\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/cyberwatch.fr\/en\/#\/schema\/person\/293954835744eee8267f0877f4e01d7a","name":"cyberwatch","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/101313e5d1b026340734cf30d8a7384c2f1121b0ec2abca7b34cec6975ffb5fd?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/101313e5d1b026340734cf30d8a7384c2f1121b0ec2abca7b34cec6975ffb5fd?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/101313e5d1b026340734cf30d8a7384c2f1121b0ec2abca7b34cec6975ffb5fd?s=96&d=mm&r=g","caption":"cyberwatch"},"sameAs":["https:\/\/cyberwatch.fr"]}]}},"_links":{"self":[{"href":"https:\/\/cyberwatch.fr\/en\/wp-json\/wp\/v2\/posts\/10157","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberwatch.fr\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberwatch.fr\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberwatch.fr\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberwatch.fr\/en\/wp-json\/wp\/v2\/comments?post=10157"}],"version-history":[{"count":1,"href":"https:\/\/cyberwatch.fr\/en\/wp-json\/wp\/v2\/posts\/10157\/revisions"}],"predecessor-version":[{"id":10170,"href":"https:\/\/cyberwatch.fr\/en\/wp-json\/wp\/v2\/posts\/10157\/revisions\/10170"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberwatch.fr\/en\/wp-json\/wp\/v2\/media\/10166"}],"wp:attachment":[{"href":"https:\/\/cyberwatch.fr\/en\/wp-json\/wp\/v2\/media?parent=10157"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberwatch.fr\/en\/wp-json\/wp\/v2\/categories?post=10157"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberwatch.fr\/en\/wp-json\/wp\/v2\/tags?post=10157"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}