Many attackers who gain access to an AWS account embed themselves in unused regions to avoid detection. CloudSploit scans every public AWS region, even the ones you don't actively use.
- CloudTrail & Config Service
- Elastic Compute Cloud (EC2)
- Identity and Access Management (IAM)
- Virtual Private Cloud (VPC)
- Relational Database Service (RDS)
- + many more ...