Product Hunt Launch!CybersecTools - Find and share cybersecurity tools across 944 use cases | Product Hunt

Cloud Security Posture Management for Aws Security

Task: Aws Security

Explore 40 curated cybersecurity tools, with 17,628+ visitors searching for solutions

FEATURED

Hudson Rock Cybercrime Intelligence Tools Logo

Cybercrime intelligence tools for searching compromised credentials from infostealers

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Get Featured

Feature your product and reach thousands of professionals.

Filter by:
Plerion Logo

A cloud-native security platform that provides asset inventory, vulnerability management, compliance monitoring, and security posture management across multiple cloud providers.

0
mass-s3-bucket-tester Logo

A Python tool that tests multiple AWS S3 buckets for security misconfigurations including directory listing and upload permissions.

0
s3tk Logo

A security toolkit for Amazon S3 that provides bucket scanning, policy validation, ACL management, and encryption features to identify and remediate S3 security vulnerabilities.

0
s3_objects_check Logo

A security tool that performs whitebox evaluation of S3 object permissions to identify publicly accessible files and generate reports on potential exposure risks.

0
s3cario Logo

S3cario is an AWS S3 bucket security testing tool that validates permissions and identifies potential vulnerabilities through scenario simulation.

0
TrailScraper Logo

TrailScraper is a command-line tool for extracting information from AWS CloudTrail logs and generating IAM policies based on actual API usage patterns.

0
S3Scanner Logo

S3Scanner is an open-source tool that scans S3 buckets across S3-compatible APIs to identify misconfigurations and security vulnerabilities.

0
Access Undenied on AWS Logo

Access Undenied on AWS analyzes CloudTrail AccessDenied events to explain access denial reasons and provide least-privilege remediation suggestions.

0
kicks3 Logo

A security tool for discovering S3 bucket references in web content and testing buckets for misconfigurations.

0
AWS Scout2 Logo

AWS Scout2 is a security assessment tool that uses the AWS API to gather configuration data and automatically identify security risks in AWS environments.

0
AWS Security Architectures Logo

A comprehensive AWS security automation toolkit that provides event monitoring, data protection, resource management, and security configuration validation across AWS environments.

0
Dow Jones Hammer Logo

A multi-account AWS security tool that identifies misconfigurations, provides real-time reporting, and performs automated remediation to establish secure cloud guardrails.

0
AWS Security Controls Logo

Comprehensive set of security controls for various AWS services to ensure a secure cloud environment.

0
Nuvola Logo

A cloud security analysis tool that creates digital twins of AWS environments using graph databases to identify attack paths and security misconfigurations through automated and manual rule-based assessments.

0
Dufflebag Logo

Dufflebag searches through public AWS EBS snapshots to identify accidentally exposed secrets and sensitive information.

0
ZeusCloud Logo

ZeusCloud is an open source cloud security platform that discovers AWS assets, identifies attack paths, and provides remediation guidance with customizable compliance controls.

0
AWS Security Toolbox (AST) Logo

A Docker container that bundles preinstalled AWS security tools for streamlined security operations and assessments in AWS environments.

0
Terraform Module: AWS Secure Baseline Logo

A Terraform module that establishes security baseline configurations for AWS accounts based on CIS benchmarks and AWS security best practices.

0
CloudTrail Partitioner Logo

CloudTrail Partitioner automates the creation and management of partitioned Athena tables for AWS CloudTrail logs with nightly partition updates.

0
iam-lint Logo

A GitHub action that lints AWS IAM policy documents to identify security issues and misconfigurations with configurable severity levels and custom rules.

0
AWS Key Usage Detector Logo

A command-line tool that analyzes local CloudTrail files to detect off-instance AWS key usage patterns for security monitoring and forensic analysis.

0
Network Access Analyzer Logo

Network Access Analyzer is an AWS VPC feature that identifies unintended network access to cloud resources by analyzing internet gateways, route tables, ACLs, and security groups.

0
Cloud Inquisitor Logo

Cloud Inquisitor is an AWS security tool that monitors resource ownership, detects domain hijacking, verifies security services, and manages IAM policies across multiple accounts.

0
aws-fast-fixes Logo

A collection of automation scripts that quickly enable essential AWS security and compliance features that are not activated by default in AWS accounts.

0