Loading...
Cloud security tools and solutions for securing cloud infrastructure, containers, serverless applications, and multi-cloud environments.
Browse 497 cloud security tools
A command-line tool that performs automated IAM policy security linting across AWS accounts and organizations using AWS Access Analyzer validation.
Cloud Inquisitor is an AWS security tool that monitors resource ownership, detects domain hijacking, verifies security services, and manages IAM policies across multiple accounts.
A Docker container that bundles preinstalled AWS security tools for streamlined security operations and assessments in AWS environments.
CloudFrunt identifies misconfigured Amazon CloudFront domains that are vulnerable to hijacking due to improper CNAME configuration.
A GitHub action that lints AWS IAM policy documents to identify security issues and misconfigurations with configurable severity levels and custom rules.
Varna is an AWS serverless security tool that monitors CloudTrail logs using Event Query Language to detect and alert on suspicious activities in cloud environments.
A comprehensive AWS security automation toolkit that provides event monitoring, data protection, resource management, and security configuration validation across AWS environments.
A collection of automation scripts that quickly enable essential AWS security and compliance features that are not activated by default in AWS accounts.
A cloud security assessment tool that collects cloud resource information, analyzes it against best practices, and generates compliance reports in multiple formats.
A Ruby-based tool that creates visual diagrams of AWS EC2 security group configurations to help understand network access patterns and security relationships.
Security Monkey monitors AWS, GCP, and OpenStack environments for policy changes and insecure configurations, providing historical tracking and alerting capabilities through a centralized interface.
TrailScraper is a command-line tool for extracting information from AWS CloudTrail logs and generating IAM policies based on actual API usage patterns.
Metabadger automates the upgrade of AWS EC2 instances to use the more secure Instance Metadata Service v2 (IMDSv2) to prevent SSRF attacks and reduce attack surface.
An open-source framework that inventories and manages AWS resources across multiple accounts by collecting data via Cross Account Assume Roles and storing it in a centralized S3 bucket for analysis.
A command-line tool that analyzes local CloudTrail files to detect off-instance AWS key usage patterns for security monitoring and forensic analysis.
rpCheckup is an AWS resource policy security analysis tool that identifies public, external, intra-organizational, and private resource access patterns across AWS accounts.
A Python-based Docker security audit tool that performs CIS benchmark assessments with customizable profiles and JSON reporting capabilities.
Weave Scope is a real-time visualization and monitoring tool that automatically maps Docker container infrastructures and microservices, providing interactive topology views and direct container management capabilities.
Prowler is an open source multi-cloud security assessment tool that performs audits, compliance checks, and security evaluations across AWS, Azure, GCP, and Kubernetes environments.
A Docker MultiStage build implementation that integrates CVE scanning into Alpine Linux container builds using Docker 17.05's build-time vulnerability assessment capabilities.
PacBot is a cloud security platform that provides continuous compliance monitoring, automated policy enforcement, and security reporting through policy-as-code implementation and multi-source data integration.
A CLI tool for securely generating keys, passwords, and providing credentials without files, primarily for building secure BOSH deployments using Vault and Spruce.
Teller is a command-line secret management tool that integrates with various cloud providers and vaults to securely populate environment variables during development workflows.
An open-source policy-as-code platform that analyzes multi-cloud and SaaS environments using SQL and YAML policies with GPT integration for security, cost, and architecture assessments.
497 tools across 9 specializations · 135 free, 362 commercial
Cloud Access Security Broker
Cloud Access Security Broker (CASB) solutions that provide visibility, compliance, data security, and threat protection for cloud services and applications.
Cloud Application Detection and Response
Cloud Application Detection and Response (CADR) platforms for real-time threat detection, incident response, and security monitoring in cloud application environments.
Cloud Investigation and Response Automation
Cloud Investigation and Response Automation (CIRA) tools for automated incident investigation, threat hunting, and security response orchestration in cloud infrastructures.
Tool roundups, buying guides, and strategic analysis from the CybersecTools resource library.
Compare the best cloud WAF and WAAP tools in 2026: Cloudflare, Akamai, F5, Fortinet, Check Point, Cisco, and Radware reviewed for real deployments.
The best cloud security tools in 2026: CNAPP, CSPM, SSPM, WAF, and CASB platforms reviewed for real-world deployment. Find the right fit for your stack.
The best container security tools in 2026: runtime detection, image scanning, Kubernetes policy, and supply chain security compared for real-world deployments.
Common questions about Cloud Security tools, selection guides, pricing, and comparisons.
CSPM (Cloud Security Posture Management) monitors cloud configurations for misconfigurations and compliance violations. CWPP (Cloud Workload Protection Platform) secures the workloads running in the cloud (VMs, containers, serverless). CNAPP (Cloud-Native Application Protection Platform) unifies CSPM, CWPP, and often CIEM into a single platform, providing security from code to cloud in one solution.
For organizations with simple cloud environments (single provider, few workloads), separate best-of-breed tools for CSPM, container security, and IAM may suffice. For multi-cloud environments with containers, serverless, and IaC, a CNAPP consolidates these capabilities, reduces alert fatigue from tool sprawl, and provides unified risk prioritization across the full cloud stack.
The most exploited cloud misconfigurations include: publicly accessible S3 buckets or storage blobs, overly permissive IAM roles, unrestricted security groups allowing 0.0.0.0/0 access, unencrypted databases and storage, disabled logging and monitoring, and default credentials on cloud services. CSPM tools continuously scan for these issues across AWS, Azure, and GCP.
Container security requires a multi-layered approach: scan container images for vulnerabilities before deployment, enforce admission controls in Kubernetes, use network policies to segment pod communication, implement runtime protection to detect anomalous container behavior, manage secrets securely (never in environment variables), and continuously monitor for drift from known-good configurations.