Essential tools and best practices for securing software applications throughout their lifecycle. Task: Configuration ManagementExplore 2 curated tools and resources
Want your tool featured here?
Get maximum visibility with pinned placement
Identifies misconfigured CloudFront domains vulnerable to hijacking
Identifies misconfigured CloudFront domains vulnerable to hijacking
A tool to conduct preliminary security checks in code, infrastructure, or IAM configurations using various open-source tools.
A tool to conduct preliminary security checks in code, infrastructure, or IAM configurations using various open-source tools.