Cloud Security for Cloud

Cloud security tools and solutions for securing cloud infrastructure, containers, serverless applications, and multi-cloud environments. Task: Cloud

Explore 25 curated cybersecurity tools, with 14,287+ visitors searching for solutions

FEATURED

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Get Featured

Feature your product and reach thousands of professionals.

OpsCompass Logo

A cloud and database asset intelligence platform that provides continuous monitoring, compliance management, and security posture assessment across hybrid cloud environments.

0
Fidelis Halo Logo

A cloud native application protection platform that provides security monitoring and protection across cloud, on-premises, and hybrid environments.

0
Sweet Logo

Cloud runtime security platform that uses eBPF technology to monitor cloud infrastructure, detect anomalies, and identify potential security threats in real-time.

0
mass-s3-bucket-tester Logo

A Python tool that tests multiple AWS S3 buckets for security misconfigurations including directory listing and upload permissions.

0
s3_objects_check Logo

A security tool that performs whitebox evaluation of S3 object permissions to identify publicly accessible files and generate reports on potential exposure risks.

0
Burp Anonymous Cloud Logo

A Burp Suite extension that uses Shodan to discover cloud buckets and tests them for publicly accessible vulnerabilities through passive scanning.

0
s3cario Logo

S3cario is an AWS S3 bucket security testing tool that validates permissions and identifies potential vulnerabilities through scenario simulation.

0
TrailScraper Logo

TrailScraper is a command-line tool for extracting information from AWS CloudTrail logs and generating IAM policies based on actual API usage patterns.

0
AWS Log Logo

A command-line tool that shows configuration history and changes of AWS resources using AWS Config service.

0
Cloud Sniper Logo

Cloud Sniper is a centralized cloud security operations platform that provides incident response, threat correlation, and automated security actions for cloud infrastructure protection.

0
nbdclient Logo

NBD (Network Block Device) is a network protocol implementation that allows clients to access remote block devices over a network as if they were local storage.

0
AWS Scout2 Logo

AWS Scout2 is a security assessment tool that uses the AWS API to gather configuration data and automatically identify security risks in AWS environments.

0
TerraGoat Logo

TerraGoat is a deliberately vulnerable Terraform repository that demonstrates common cloud infrastructure misconfigurations for training and testing security tools.

0
Dufflebag Logo

Dufflebag searches through public AWS EBS snapshots to identify accidentally exposed secrets and sensitive information.

0
Forseti Security Logo

An archived community-driven collection of open source cloud security tools that provided monitoring and compliance capabilities for cloud infrastructure.

0
CloudTrail Partitioner Logo

CloudTrail Partitioner automates the creation and management of partitioned Athena tables for AWS CloudTrail logs with nightly partition updates.

0
nbdserver Logo

A userland implementation of the Network Block Device protocol that enables remote block device access over network connections for distributed storage and virtualization use cases.

0
Ice Logo

Ice is an AWS cloud cost management tool that provides multi-level visibility into cloud spending and resource utilization to support informed reservation purchases and resource optimization decisions.

0
Metabadger Logo

Metabadger automates the upgrade of AWS EC2 instances to use the more secure Instance Metadata Service v2 (IMDSv2) to prevent SSRF attacks and reduce attack surface.

0
Cloudmarker Logo

Cloudmarker is a configurable cloud monitoring tool and framework that audits Azure and GCP environments by retrieving, analyzing, and alerting on cloud security data.

0
SkyArk Logo

SkyArk is a cloud security scanning tool that identifies privileged entities in AWS and Azure environments to help mitigate Cloud Shadow Admin threats.

0
SkyWrapper Logo

SkyWrapper analyzes temporary token behaviors in AWS accounts to detect suspicious activities and generates Excel reports with findings summaries.

0
Teller Logo

Teller is a command-line secret management tool that integrates with various cloud providers and vaults to securely populate environment variables during development workflows.

0
Security Monkey Logo

Security Monkey monitors AWS, GCP, and OpenStack environments for policy changes and insecure configurations, providing historical tracking and alerting capabilities through a centralized interface.

0