Trend Micro Cloud One™

Conformity Knowledge Base

Cloud One - Conformity provides real-time monitoring and auto-remediation for the security, compliance and governance of your cloud infrastructure. Leaving you to grow and scale your business with confidence with over 750 automated best practice checks.

Knowledge Base

Along with better visibility, compliance and faster remediation for your cloud infrastructure, Conformity also has a growing public library of 750+ cloud infrastructure configuration best practices for your AWS™, Microsoft® Azure, and Google Cloud™ environments. Providing simple, step-by-step resolutions to rectify any security vulnerabilities, performance, cost inefficiencies, and reliability risks. This catalogue of cloud guardrails is a core part of Conformity which automatically monitors and auto-remediates cloud infrastructure.

Below are the cloud, services and their associated best practice rules with clear instructions on how to perform the updates – made either through the console or via the Command Line Interface (CLI).

Service coverage for


Service coverage for

  • AKS

    Microsoft AKS allows you to quickly deploy a production ready Kubernetes cluster in Azure

  • Access Control

    Microsoft Azure Active Directory Access Control (also known as Access Control Service or ACS) is a cloud-based service that provides an easy way of authenticating and authorizing users to gain access to your web applications and services

  • Active Directory

    Azure Active Directory provides an identity platform with enhanced security, access management, scalability, and reliability for connecting users with all the apps they need.

  • Activity Log

    The Azure Activity Log provides insight into subscription-level events that have occurred in Azure

  • Advisor

    Azure Advisor is a personalized cloud consultant that helps you follow best practices to optimize your Azure deployments.

  • AppService

    Azure AppService

  • CosmosDB

    Microsoft Cosmos DB enables you to elastically and independently scale throughput and storage across any number of Azure regions worldwide.

  • KeyVault

    Microsoft Azure Key Vault enables you to securely store and access secrets within your Azure cloud environment

  • Locks

    Microsoft Azure Locks provide a way for administrators to lock down resources to prevent deletion or changing of a resource

  • Monitor

    Monitor your applications and infrastructure

  • MySQL

    Azure Database for MySQL servers

  • Network


  • Policy


  • PostgreSQL

    Azure Database for PostgreSQL servers

  • Recovery Services

    Azure Recovery Services provides multiple backup solutions based on the backup requirement and infrastructure topology

  • Redis Cache

  • Resources

  • Search

  • Defender

    Security posture management for cloud workloads

  • Sql

    Azure Database for SQL servers

  • Storage Accounts

    An Azure storage account contains all of your Azure Storage data objects

  • Subscriptions

  • Virtual Machines

    VirtualMachines your applications and infrastructure