A list of cloud security tools and vendors.
☆190Sep 6, 2024Updated last year
Alternatives and similar repositories for cloud-security-list
Users that are interested in cloud-security-list are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Cloud Security Posture security policies☆32Nov 28, 2025Updated 5 months ago
- Terraform wrapper script for handling multi-environment, multi-region deployments☆11Jul 5, 2016Updated 9 years ago
- Work with AWS ARNs programmatically and more☆29Apr 12, 2026Updated 3 weeks ago
- Binary builds for dep-scan - The Dependency Scanner☆10Apr 1, 2024Updated 2 years ago
- terrarium☆22Apr 19, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ElectricEye is a multi-cloud, multi-SaaS Python CLI tool for Asset Management, Security Posture Management & Attack Surface Monitoring su…☆1,037Feb 9, 2026Updated 3 months ago
- Test & Compare different Kubernetes security offerings on EKS, GKE and AKS☆41Aug 29, 2024Updated last year
- Runs IAM policy linting and security checks against either a single AWS account or multiple member accounts of an AWS Organization.☆152Dec 21, 2025Updated 4 months ago
- Terraform module to provision Service Control Policies (SCP) for AWS Organizations, Organizational Units, and AWS accounts☆57Dec 11, 2025Updated 4 months ago
- ☆36Apr 29, 2025Updated last year
- Security compliance platform - SOC2, CMMC, ASVS, ISO27001, HIPAA, NIST CSF, NIST 800-53, CSC CIS 18, PCI DSS, SSF tracking☆667Apr 16, 2026Updated 3 weeks ago
- List of known AWS accounts☆257Apr 2, 2026Updated last month
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆59Sep 7, 2023Updated 2 years ago
- Custom Atlantis docker image developed by GetInData☆15Apr 29, 2024Updated 2 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Run Falco in a GitHub Actions to detect suspicious behavior in your CI/CD☆49Mar 26, 2026Updated last month
- ☆10Aug 9, 2024Updated last year
- Container 📦 Security 🔐 Best Practices Checklist 📋 & Slides☆69Oct 28, 2020Updated 5 years ago
- This solutions facilitates rapid deployment of Prowler, full AWS Organization analysis, and finding processing as part of a security post…☆63Jun 2, 2025Updated 11 months ago
- A Kubewarden Policy that detects usage of deprecated and dropped Kubernetes resources☆16Jan 20, 2026Updated 3 months ago
- CloudSplaining on AWS Managed Policies☆44Sep 8, 2025Updated 8 months ago
- Generate datasets of cloud audit logs for common attacks☆237Apr 26, 2026Updated last week
- Terraform module to Automatically suppress findings recorded by the AWS Security Hub service based on a pre-defined and configurable supp…☆19Apr 7, 2026Updated last month
- HoneyAgents is a PoC demo of an AI-driven system that combines honeypots with autonomous AI agents to detect and mitigate cyber threats. …☆58Jan 5, 2024Updated 2 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- A flexible framework for security teams to build and deploy AI-powered workflows that complement their existing security operations.☆156Feb 9, 2026Updated 2 months ago
- Fix Inventory helps you identify and remove the most critical risks in AWS, GCP, Azure and Kubernetes.☆2,065Mar 28, 2026Updated last month
- eagle-eye☆46Dec 5, 2024Updated last year
- Cloud Analytics helps defenders detect attacks to their cloud infrastructure by developing behavioral analytics for cloud platforms as we…☆54Apr 25, 2023Updated 3 years ago
- Complete CNAPP Demo using Prisma Cloud☆17Mar 26, 2025Updated last year
- Infrastructure developer tools includes set of plugins and services that make it easier than ever to build, test and deploy infrastructur…☆13Mar 23, 2021Updated 5 years ago
- ## Auto-archived due to inactivity. ## Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Securit…☆37Oct 17, 2024Updated last year
- ☆29Nov 20, 2023Updated 2 years ago
- Cartography is a Python tool that pulls infrastructure assets and their relationships into a Neo4j graph database.☆3,862May 2, 2026Updated last week
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- The Certified in Cybersecurity℠ (CC) is for anyone interested in gaining a basic understanding of cybersecurity concepts. This is an ent…☆28Mar 22, 2025Updated last year
- Verify that a local file is identical to an object on Amazon S3, without having to download the object.☆12Sep 6, 2024Updated last year
- Make AWS IAM policies smaller by adding wildcards to actions.☆19Updated this week
- Prisma Cloud SDK in Go☆18Mar 24, 2025Updated last year
- ☆33Jun 27, 2022Updated 3 years ago
- Open source security data lake for threat hunting, detection & response, and cybersecurity analytics at petabyte scale on AWS☆1,671Jan 8, 2025Updated last year
- Delete S3 buckets the easy way☆21Aug 29, 2023Updated 2 years ago