Select > Reports > Portal > Repository > Standard Content > Cloud > CSA > The Treacherous 12.
Malicious users can infiltrate and cause data breaches based on poor authentication methods and weak password policies. Use the following reports to watch for threats due to insufficient identity credentials and access management:
Lists events associated with weakened AWS account password policy.
Lists events associated with invalid or expired certificates.
Lists events associated with unsecured passwords.