How it works

Connect, scan, generate, close gaps.

Deploy a read-only IAM role for DCV scanning, or paste a CVE or threat advisory into CloudSigma. Both products produce output in minutes.

Four steps from first scan to closed gap
01

Connect or paste

Deploy a read-only IAM role for DCV scanning. Or paste a CVE, URL, or raw threat text into CloudSigma.

02

Scan & generate

DCV discovers detections in your environment. CloudSigma extracts TTPs and generates Sigma rules.

03

View coverage

See your MITRE ATT&CK heatmap and generated rules. Understand gaps and get actionable output.

04

Close gaps

Deploy remediation templates from DCV. Import Sigma rules from CloudSigma into your SIEM. Full-stack coverage.

Ready?

Start with either product. Free.

Both products have a free tier and no credit card required. Most teams have their first coverage report in under ten minutes.