Skip to main content
CloudEval security workflows are typically executed through architecture context + AI analysis + report regeneration.

Available surfaces

  • architecture context inspection for exposed components and dependency paths.
  • AI-assisted risk identification and remediation brainstorming.
  • well-architected/security report generation and history retrieval.

Practical review flow

  1. Generate architecture and identify internet-exposed paths.
  2. Run targeted AI prompts for high-risk resources.
  3. Regenerate security-oriented reports after remediation edits.
  4. Track trend over time through report history.

Notes

  • Use CloudEval outputs as decision support.
  • Final compliance/security sign-off should remain with your security process.
Last modified on March 5, 2026