From sentinelone
Reviews SentinelOne XSPM misconfigurations across AWS, Azure, GCP, Kubernetes, identity, and IaC. Covers detection, compliance standards, MITRE ATT&CK mappings, remediation steps, evidence, and MSP posture workflows.
npx claudepluginhub wyre-technology/msp-claude-plugins --plugin sentineloneThis skill uses the workspace's default tool permissions.
Misconfigurations in SentinelOne are tracked through the Extended Security Posture Management (XSPM) module. The platform detects security configuration gaps across cloud environments (AWS, Azure, GCP), Kubernetes clusters, identity providers (Active Directory, Entra ID), and infrastructure-as-code templates. Each misconfiguration includes compliance standard mappings, MITRE ATT&CK technique ma...
Provides UI/UX resources: 50+ styles, color palettes, font pairings, guidelines, charts for web/mobile across React, Next.js, Vue, Svelte, Tailwind, React Native, Flutter. Aids planning, building, reviewing interfaces.
Fetches up-to-date documentation from Context7 for libraries and frameworks like React, Next.js, Prisma. Use for setup questions, API references, and code examples.
Calculates TAM/SAM/SOM using top-down, bottom-up, and value theory methodologies for market sizing, revenue estimation, and startup validation.
Misconfigurations in SentinelOne are tracked through the Extended Security Posture Management (XSPM) module. The platform detects security configuration gaps across cloud environments (AWS, Azure, GCP), Kubernetes clusters, identity providers (Active Directory, Entra ID), and infrastructure-as-code templates. Each misconfiguration includes compliance standard mappings, MITRE ATT&CK technique mappings, remediation steps, and evidence showing the specific resource, file, IP, port, or secret involved.
For MSPs, misconfiguration detection is essential for maintaining client security posture -- identifying exposed S3 buckets, overly permissive firewall rules, unrotated service account keys, and Kubernetes workloads running as root. These findings directly support compliance audits and QBR security reporting.
All misconfiguration tools are read-only. You can view, search, and report on misconfigurations, but you cannot remediate them through the MCP tools.
| Tool | Description | Key Parameters |
|---|---|---|
get_misconfiguration | Get a single misconfiguration by ID | misconfigurationId (required) |
list_misconfigurations | List misconfigurations with filters | severity, status, viewType, limit, cursor, sortBy, sortOrder |
search_misconfigurations | Search misconfigurations with GraphQL filters | filters (array of fieldId/filterType/values), limit, cursor |
get_misconfiguration_notes | Get notes on a misconfiguration | misconfigurationId (required) |
get_misconfiguration_history | Get timeline of changes for a misconfiguration | misconfigurationId (required) |
Call list_misconfigurations with optional parameters:
severity to CRITICAL, HIGH, MEDIUM, LOW, or INFOstatus to NEW, IN_PROGRESS, RESOLVED, RISK_ACKED, or SUPPRESSEDviewType to scope the detection domain (see View Types below)sortBy and sortOrderlimit and use cursor for subsequent pagesExample: List critical cloud misconfigurations:
list_misconfigurations with severity=CRITICAL, viewType=CLOUD, sortOrder=DESCExample: List Kubernetes misconfigurations:
list_misconfigurations with viewType=KUBERNETES, limit=50Call search_misconfigurations with a filters array:
Example: Search for misconfigurations in a client's environment:
search_misconfigurations with filters=[{"fieldId": "siteName", "filterType": "EQUALS", "values": ["Acme Corporation"]}]Example: Search for a specific compliance standard:
search_misconfigurations with filters=[{"fieldId": "complianceStandard", "filterType": "CONTAINS", "values": ["CIS"]}]Call get_misconfiguration with the misconfigurationId to retrieve full details including compliance mappings, evidence, and remediation steps.
Call get_misconfiguration_notes with the misconfigurationId to retrieve analyst comments and tracking notes.
Call get_misconfiguration_history with the misconfigurationId to retrieve the timeline of status changes and updates.
| View Type | Description | Example Findings |
|---|---|---|
CLOUD | Cloud infrastructure (AWS, Azure, GCP) | Public S3 buckets, open security groups, unencrypted storage |
KUBERNETES | Kubernetes clusters and workloads | Containers running as root, missing network policies, exposed dashboards |
IDENTITY | Identity providers (AD, Entra ID) | Stale accounts, excessive permissions, missing MFA |
INFRASTRUCTURE_AS_CODE | IaC templates (Terraform, CloudFormation) | Hardcoded secrets, missing encryption, overly permissive policies |
ADMISSION_CONTROLLER | Kubernetes admission policies | Policy violations in pod deployments |
SECRET_SCANNING | Exposed secrets and credentials | API keys in code, hardcoded passwords, leaked tokens |
Misconfigurations are mapped to industry compliance standards:
| Standard | Description |
|---|---|
| CIS Benchmarks | Center for Internet Security configuration benchmarks |
| SOC 2 | Service Organization Control Type 2 |
| PCI DSS | Payment Card Industry Data Security Standard |
| HIPAA | Health Insurance Portability and Accountability Act |
| NIST 800-53 | National Institute of Standards and Technology |
| ISO 27001 | International information security standard |
| GDPR | General Data Protection Regulation |
| AWS Well-Architected | AWS security best practices |
| Azure Security Benchmark | Azure security best practices |
Misconfigurations are mapped to MITRE ATT&CK techniques they could enable:
| Misconfiguration Type | MITRE Technique |
|---|---|
| Public cloud storage | T1530 - Data from Cloud Storage |
| Excessive IAM permissions | T1078 - Valid Accounts |
| Missing MFA | T1078.004 - Cloud Accounts |
| Open management ports | T1133 - External Remote Services |
| Unencrypted data at rest | T1565 - Data Manipulation |
| Exposed secrets | T1552 - Unsecured Credentials |
Each misconfiguration includes evidence showing the specific resource affected:
| Evidence Type | Description |
|---|---|
files | Affected files or IaC templates |
ips | IP addresses or CIDR ranges |
ports | Open ports or port ranges |
secrets | Exposed credentials or API keys (redacted) |
resources | Cloud resource ARNs or identifiers |
policies | IAM policies or security group rules |
| Field | Type | Description |
|---|---|---|
misconfigurationId | string | Unique misconfiguration identifier |
name | string | Misconfiguration name/title |
severity | string | CRITICAL/HIGH/MEDIUM/LOW/INFO |
status | string | NEW/IN_PROGRESS/RESOLVED/RISK_ACKED/SUPPRESSED |
viewType | string | Detection domain (CLOUD, KUBERNETES, etc.) |
detectedAt | datetime | When the misconfiguration was first detected |
siteName | string | SentinelOne site (MSP client) |
complianceStandards | array | Mapped compliance standards |
mitreAttackTechniques | array | MITRE ATT&CK technique IDs |
remediationSteps | string | Step-by-step remediation guidance |
evidence | object | Evidence details (files, IPs, ports, secrets) |
resourceType | string | Type of affected resource |
resourceName | string | Name of affected resource |
cloudProvider | string | AWS/AZURE/GCP (for cloud findings) |
region | string | Cloud region (for cloud findings) |
list_misconfigurations with viewType=CLOUD, severity=CRITICAL, sortOrder=DESCget_misconfiguration for full details and remediation stepssearch_misconfigurations filtered by compliance standard (e.g., CIS, SOC 2, HIPAA)search_misconfigurations filtered by siteName for the clientlist_misconfigurations with viewType=KUBERNETES, limit=100list_misconfigurations with viewType=IDENTITYMisconfiguration Detail:
{
"misconfigurationId": "misconfig-xyz-789",
"name": "S3 Bucket Public Access Enabled",
"severity": "CRITICAL",
"status": "NEW",
"viewType": "CLOUD",
"detectedAt": "2026-02-24T04:30:00.000Z",
"siteName": "Acme Corporation",
"cloudProvider": "AWS",
"region": "us-east-1",
"resourceType": "S3 Bucket",
"resourceName": "acme-backup-2026",
"complianceStandards": ["CIS AWS 1.5", "SOC 2", "PCI DSS 3.2.1"],
"mitreAttackTechniques": ["T1530"],
"remediationSteps": "1. Navigate to S3 > acme-backup-2026 > Permissions\n2. Enable 'Block all public access'\n3. Verify no bucket policies grant public access\n4. Enable S3 access logging",
"evidence": {
"resources": ["arn:aws:s3:::acme-backup-2026"],
"policies": ["PublicRead ACL enabled"]
}
}
| Error | Cause | Resolution |
|---|---|---|
| Misconfiguration not found | Invalid misconfigurationId | Verify the ID with list_misconfigurations |
| Invalid severity filter | Wrong severity value | Use CRITICAL, HIGH, MEDIUM, LOW, or INFO |
| Invalid view type | Wrong viewType value | Use CLOUD, KUBERNETES, IDENTITY, etc. |
| Empty results | No matching misconfigurations | Widen filters or check scope |
| Authentication error | Invalid token | Verify Service User token is Account or Site level |