CloudEval security workflows are typically executed through architecture context + AI analysis + report regeneration.
Available surfaces
- architecture context inspection for exposed components and dependency paths.
- AI-assisted risk identification and remediation brainstorming.
- well-architected/security report generation and history retrieval.
Practical review flow
- Generate architecture and identify internet-exposed paths.
- Run targeted AI prompts for high-risk resources.
- Regenerate security-oriented reports after remediation edits.
- Track trend over time through report history.
Notes
- Use CloudEval outputs as decision support.
- Final compliance/security sign-off should remain with your security process.
Last modified on March 5, 2026