Enumerating cloud resources
Checking IAM policies & roles
Scanning S3 bucket configurations
Evaluating security group rules
Testing encryption at rest
Generating remediation report