This level of granularity proves that "checking the box" with a cloud configuration scanner is insufficient for securing the ...