aquasecurity / cfsecLinks
Static analysis for CloudFormation templates to identify common misconfiguration
☆57Updated 3 years ago
Alternatives and similar repositories for cfsec
Users that are interested in cfsec are comparing it to the libraries listed below
Sorting:
- ☆55Updated last week
- A tool to check the security settings of Github Organizations.☆71Updated 2 years ago
- Open-source proof-of-concept client for AWS IAM Roles Anywhere☆71Updated 2 years ago
- vscode extension for tfsec☆30Updated 2 years ago
- Darkbit Cloud Security Tools☆25Updated 4 years ago
- a tool to audit the istio service mesh☆173Updated 3 years ago
- PolicyGlass allows you to analyse one or more AWS policies' effective permissions in aggregate, by restating them in the form of PolicySh…☆60Updated 3 years ago
- Prevent SSRF attacks on AWS EC2 via automated upgrades to the more secure Instance Metadata Service v2 (IMDSv2).☆143Updated 2 months ago
- Compares and analyzes GCP IAM roles.☆77Updated 4 months ago
- ☆33Updated 2 years ago
- An SBOM query language and associated utilities☆54Updated last year
- Automated determination of which AWS services run where☆20Updated this week
- ☆23Updated 2 years ago
- Slack alert bot for matching Github Audit Events☆10Updated 7 months ago
- Dockerfile Security Checker using OPA Rego policies with Conftest☆60Updated 3 years ago
- Compare vulnerability scanners results (to make them better!)☆20Updated 2 weeks ago
- Interrogate your GitHub resources with the help of the world's greatest detectives: Powerpipe + Steampipe + Sherlock.☆40Updated 8 months ago
- CloudSplaining on AWS Managed Policies☆44Updated last week
- ☆113Updated this week
- Security scanning & static analysis tool☆94Updated 8 months ago
- Run compliance and security controls to detect Terraform AWS resources deviating from security best practices prior to deployment using P…☆27Updated 8 months ago
- Identify all permitted data paths originating from the Internet to Network Interfaces within AWS Accounts across the entire AWS Organizat…☆39Updated last year
- A Golang program to rotate AWS & GCP account keys☆66Updated 2 months ago
- vexctl is a tool to attest VEX impact statements☆44Updated 2 years ago
- Docker Secure Computing Profile Generator☆48Updated 3 years ago
- KaiMonkey provides vulnerable infrastructure as code (IaC) to help explore and understand common cloud security threats exposed via IaC.☆101Updated last year
- 'Continuous' AWS perimeter monitoring: Periodically scan internet facing AWS resources to detect misconfigured services.☆64Updated 5 years ago
- Security configuration checks for popular cloud native applications and infrastructure.☆118Updated 3 years ago
- TACOS framework structural details☆20Updated last month
- The open source version of the AWS Security Hub documentation. To provide feedback or request changes, you can submit a pull request that…☆35Updated 2 years ago