Loading...
Cloud security tools and solutions for securing cloud infrastructure, containers, serverless applications, and multi-cloud environments.
Browse 497 cloud security tools
AI-Powered Cloud Assistant for building, securing, and operating cloud environments.
A community repository of custom AWS Config rules for evaluating AWS resource configurations against compliance and security standards.
Access Undenied on AWS analyzes CloudTrail AccessDenied events to explain access denial reasons and provide least-privilege remediation suggestions.
ZeusCloud is an open source cloud security platform that discovers AWS assets, identifies attack paths, and provides remediation guidance with customizable compliance controls.
Network Access Analyzer is an AWS VPC feature that identifies unintended network access to cloud resources by analyzing internet gateways, route tables, ACLs, and security groups.
A CLI tool for bulk deletion and inspection of AWS resources to clean up testing accounts and prevent unnecessary charges.
Komiser is an open-source cloud-agnostic resource manager that analyzes and manages cloud cost, usage, security, and governance across multiple cloud providers in a unified platform.
Zeus is an AWS security auditing and hardening tool that evaluates cloud configurations against CIS benchmarks and can automatically apply recommended security settings.
A graph-based tool for visualizing AWS access permissions and resource relationships to identify potential attack paths and privilege escalation opportunities.
SkyArk is a cloud security scanning tool that identifies privileged entities in AWS and Azure environments to help mitigate Cloud Shadow Admin threats.
PrismX is a cloud security dashboard that provides centralized AWS security monitoring based on CIS benchmarks with JIRA integration for issue management.
CFRipper is a security analyzer for AWS CloudFormation templates that identifies vulnerabilities and misconfigurations before cloud deployment.
DataCop is an AWS framework that automatically blocks S3 buckets containing PII or classified information based on AWS Macie findings and configurable security policies.
Krampus is an AWS resource management tool that automates the deletion and disabling of cloud objects based on JSON task files for security remediation and cost control.
A defense-in-depth security automation framework for AWS that combines threat intelligence, machine learning, and serverless technologies to prevent, detect, and respond to threats through automated security telemetry collection and analysis.
Cloud Custodian is a YAML-based rules engine that manages and enforces security, compliance, and cost optimization policies across AWS, Azure, and GCP cloud environments in real-time.
Ice is an AWS cloud cost management tool that provides multi-level visibility into cloud spending and resource utilization to support informed reservation purchases and resource optimization decisions.
A cloud security analysis tool that creates digital twins of AWS environments using graph databases to identify attack paths and security misconfigurations through automated and manual rule-based assessments.
A Terraform module that establishes security baseline configurations for AWS accounts based on CIS benchmarks and AWS security best practices.
An automated AWS security compliance remediation system that uses Lambda functions and SQS queues to automatically fix security violations detected by AWS Config.
ElectricEye is a multi-cloud Python CLI tool that performs security posture management and attack surface monitoring across cloud service providers and SaaS platforms with over 1000 security checks mapped to 20+ compliance frameworks.
A command-line tool that shows configuration history and changes of AWS resources using AWS Config service.
CloudTrail Partitioner automates the creation and management of partitioned Athena tables for AWS CloudTrail logs with nightly partition updates.
A multi-threaded Ruby tool for comprehensive AWS security inventory collection that gathers detailed resource attributes, metadata, and policy information across AWS environments.
497 tools across 9 specializations · 135 free, 362 commercial
Cloud Access Security Broker
Cloud Access Security Broker (CASB) solutions that provide visibility, compliance, data security, and threat protection for cloud services and applications.
Cloud Application Detection and Response
Cloud Application Detection and Response (CADR) platforms for real-time threat detection, incident response, and security monitoring in cloud application environments.
Cloud Investigation and Response Automation
Cloud Investigation and Response Automation (CIRA) tools for automated incident investigation, threat hunting, and security response orchestration in cloud infrastructures.
Tool roundups, buying guides, and strategic analysis from the CybersecTools resource library.
Compare the best cloud WAF and WAAP tools in 2026: Cloudflare, Akamai, F5, Fortinet, Check Point, Cisco, and Radware reviewed for real deployments.
The best cloud security tools in 2026: CNAPP, CSPM, SSPM, WAF, and CASB platforms reviewed for real-world deployment. Find the right fit for your stack.
The best container security tools in 2026: runtime detection, image scanning, Kubernetes policy, and supply chain security compared for real-world deployments.
Common questions about Cloud Security tools, selection guides, pricing, and comparisons.
CSPM (Cloud Security Posture Management) monitors cloud configurations for misconfigurations and compliance violations. CWPP (Cloud Workload Protection Platform) secures the workloads running in the cloud (VMs, containers, serverless). CNAPP (Cloud-Native Application Protection Platform) unifies CSPM, CWPP, and often CIEM into a single platform, providing security from code to cloud in one solution.
For organizations with simple cloud environments (single provider, few workloads), separate best-of-breed tools for CSPM, container security, and IAM may suffice. For multi-cloud environments with containers, serverless, and IaC, a CNAPP consolidates these capabilities, reduces alert fatigue from tool sprawl, and provides unified risk prioritization across the full cloud stack.
The most exploited cloud misconfigurations include: publicly accessible S3 buckets or storage blobs, overly permissive IAM roles, unrestricted security groups allowing 0.0.0.0/0 access, unencrypted databases and storage, disabled logging and monitoring, and default credentials on cloud services. CSPM tools continuously scan for these issues across AWS, Azure, and GCP.
Container security requires a multi-layered approach: scan container images for vulnerabilities before deployment, enforce admission controls in Kubernetes, use network policies to segment pod communication, implement runtime protection to detect anomalous container behavior, manage secrets securely (never in environment variables), and continuously monitor for drift from known-good configurations.