Tools for managing identities, access controls, and secure credential storage. Task: Aws
Explore 27 curated tools and resources
An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.
A cloud-native web application and API security solution that uses contextual AI to protect against known and zero-day threats without signature-based detection.
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.
AWS IAM Access Analyzer is a tool for implementing and maintaining least privilege access in AWS environments through automated analysis and validation of IAM policies and permissions.
Identify AWS IAM permissions by brute-forcing API calls.
Securely store and access AWS credentials in a development environment.
A tool that generates least privilege IAM policies for AWS services
IAM Zero detects IAM issues and suggests least-privilege policies for AWS and other cloud platforms.
A tool for searching through public EBS snapshots for secrets, organized as an Elastic Beanstalk application.
Repokid uses Access Advisor to remove unused service permissions from IAM roles in AWS.
Centralized workforce identity management for AWS applications.
Provision, manage, and renew SSL/TLS certificates for your AWS resources with AWS Certificate Manager.
Redirects EC2 metadata API traffic to a container that retrieves temporary AWS credentials and proxies other calls to the EC2 metadata API.
Chamber is a tool for managing secrets that utilizes AWS SSM Parameter Store.
An attacker can create a new IAM policy version and set it as the default version without requiring the iam:SetDefaultPolicyVersion permission.