Loading...
Cloud security tools and solutions for securing cloud infrastructure, containers, serverless applications, and multi-cloud environments.
Browse 497 cloud security tools
Chamber is a command-line tool for managing secrets by storing them in AWS SSM Parameter Store with path-based API support for improved performance.
An AWS IAM security assessment tool that identifies least privilege violations and generates risk-prioritized reports for IAM policy remediation.
A tool that generates Terraform files for creating Azure Policy Initiatives to implement cloud security guardrails and enforce organizational standards at scale.
FunctionShield is a Serverless Security Library for Developers to enforce strict security controls on AWS Lambda & Google Cloud Functions runtimes.
A Terraform module that provides a compliance-focused AWS EKS setup with security hardening for PCI-DSS, SOC2, and HIPAA requirements.
A command-line tool that extracts manifest and configuration data from Docker registry images for security analysis and reconnaissance purposes.
Azucar is a multi-threaded plugin-based tool that performs read-only security assessments of Azure Cloud environments, analyzing various assets and configurations without modifying deployed resources.
Scout Suite is an open source multi-cloud security auditing tool that gathers configuration data via cloud provider APIs to identify risks and provide visibility into cloud attack surfaces.
A Golang-based container security scanner that identifies potential vulnerabilities and misconfigurations in container environments by checking namespacing, capabilities, security profiles, and host device mounts.
NAXSI is a third-party nginx module that prevents XSS and SQL injection attacks by filtering HTTP traffic based on predefined security rules.
SOPS is an encrypted file editor that supports multiple formats and integrates with various key management services including AWS KMS, GCP KMS, Azure Key Vault, age, and PGP.
Kubernetes security platform with industry standard open source utilities for securing Kubernetes clusters and apps.
A secret management service that stores encrypted secrets in DynamoDB for secure credential and sensitive data management.
LinuxKit is a toolkit for building custom minimal, immutable Linux distributions with secure defaults for running containerized applications like Docker and Kubernetes.
tfsec is being replaced by Trivy, a more comprehensive open-source security solution
Tang is a network-based server that binds encrypted data access to network presence, allowing data decryption only when clients are connected to the specific network where the Tang server operates.
Clevis is a pluggable framework that enables automated decryption of data and LUKS volumes through a pin-based plugin system.
minikube is a local Kubernetes cluster management tool that enables developers to run and test Kubernetes applications on their local machines across multiple operating systems.
Kubeadm is a tool for creating Kubernetes clusters with best practices.
Security-Guard helps secure microservices and serverless containers by detecting and blocking exploits.
AWS Scout2 is a security assessment tool that uses the AWS API to gather configuration data and automatically identify security risks in AWS environments.
gVisor is a Go-based application kernel that provides enhanced container isolation by implementing Linux system calls and limiting host kernel exposure through its runsc OCI runtime.
AWS Web Application Firewalls (WAFs) are cloud-based security services that protect web applications and APIs from internet-based attacks through customizable filtering rules and centralized management capabilities.
Bane is an automated AppArmor profile generator for Docker containers that simplifies the creation of security policies with file globbing support and Docker integration.
497 tools across 9 specializations · 135 free, 362 commercial
Cloud Access Security Broker
Cloud Access Security Broker (CASB) solutions that provide visibility, compliance, data security, and threat protection for cloud services and applications.
Cloud Application Detection and Response
Cloud Application Detection and Response (CADR) platforms for real-time threat detection, incident response, and security monitoring in cloud application environments.
Cloud Investigation and Response Automation
Cloud Investigation and Response Automation (CIRA) tools for automated incident investigation, threat hunting, and security response orchestration in cloud infrastructures.
Tool roundups, buying guides, and strategic analysis from the CybersecTools resource library.
Compare the best cloud WAF and WAAP tools in 2026: Cloudflare, Akamai, F5, Fortinet, Check Point, Cisco, and Radware reviewed for real deployments.
The best cloud security tools in 2026: CNAPP, CSPM, SSPM, WAF, and CASB platforms reviewed for real-world deployment. Find the right fit for your stack.
The best container security tools in 2026: runtime detection, image scanning, Kubernetes policy, and supply chain security compared for real-world deployments.
Common questions about Cloud Security tools, selection guides, pricing, and comparisons.
CSPM (Cloud Security Posture Management) monitors cloud configurations for misconfigurations and compliance violations. CWPP (Cloud Workload Protection Platform) secures the workloads running in the cloud (VMs, containers, serverless). CNAPP (Cloud-Native Application Protection Platform) unifies CSPM, CWPP, and often CIEM into a single platform, providing security from code to cloud in one solution.
For organizations with simple cloud environments (single provider, few workloads), separate best-of-breed tools for CSPM, container security, and IAM may suffice. For multi-cloud environments with containers, serverless, and IaC, a CNAPP consolidates these capabilities, reduces alert fatigue from tool sprawl, and provides unified risk prioritization across the full cloud stack.
The most exploited cloud misconfigurations include: publicly accessible S3 buckets or storage blobs, overly permissive IAM roles, unrestricted security groups allowing 0.0.0.0/0 access, unencrypted databases and storage, disabled logging and monitoring, and default credentials on cloud services. CSPM tools continuously scan for these issues across AWS, Azure, and GCP.
Container security requires a multi-layered approach: scan container images for vulnerabilities before deployment, enforce admission controls in Kubernetes, use network policies to segment pod communication, implement runtime protection to detect anomalous container behavior, manage secrets securely (never in environment variables), and continuously monitor for drift from known-good configurations.