Loading...
Browse 34 terraform tools
Agentic cloud exposure management platform with AI-driven remediation.
Agentic cloud exposure management platform with AI-driven remediation.
IaC-based access management via a Terraform provider for IAM at scale.
IaC-based access management via a Terraform provider for IAM at scale.
IaC scanner detecting misconfigs, vulnerabilities & policy violations in templates.
IaC scanner detecting misconfigs, vulnerabilities & policy violations in templates.
Auto-generates threat models from IaC files with risk & control mapping.
Auto-generates threat models from IaC files with risk & control mapping.
Self-hosted dev environment platform with AI agent governance via Terraform.
Terraform-native access governance with automated request & approval flows.
Terraform-native access governance with automated request & approval flows.
IaC security scanner with 500+ policies for cloud infrastructure misconfigurations
IaC security scanner with 500+ policies for cloud infrastructure misconfigurations
Modern WAF with code-based rules and developer-focused workflow integration
Modern WAF with code-based rules and developer-focused workflow integration
Container-based app deployment & database mgmt platform with security features
Container-based app deployment & database mgmt platform with security features
Observability pipeline for collecting, reducing, enriching & routing telemetry
Observability pipeline for collecting, reducing, enriching & routing telemetry
Synthetic monitoring for websites, APIs, and user flows from global locations
Synthetic monitoring for websites, APIs, and user flows from global locations
WAF protecting web apps and APIs from OWASP Top 10 and other threats
WAF protecting web apps and APIs from OWASP Top 10 and other threats
IaC security scanning tool for DevOps with cloud config & container management
IaC security scanning tool for DevOps with cloud config & container management
IaC scanning tool that identifies misconfigurations before deployment
IaC scanning tool that identifies misconfigurations before deployment
CSPM tool for detecting and remediating cloud misconfigurations
CSPM tool for detecting and remediating cloud misconfigurations
IaC scanner for Terraform, CloudFormation, and Helm misconfigurations
IaC scanner for Terraform, CloudFormation, and Helm misconfigurations
IaC scanning tool for Terraform, CloudFormation, and Kubernetes configurations
IaC scanning tool for Terraform, CloudFormation, and Kubernetes configurations
Application delivery controller for optimizing app performance and security
Application delivery controller for optimizing app performance and security
Scans IaC files for misconfigurations before deployment to production.
Scans IaC files for misconfigurations before deployment to production.
IaC security scanning for Kubernetes, Terraform, CloudFormation, and ARM templates
IaC security scanning for Kubernetes, Terraform, CloudFormation, and ARM templates
IT security training platform for network, cloud, and cybersecurity skills
IT security training platform for network, cloud, and cybersecurity skills
Policy Sentry is an automated IAM policy generator that helps developers create least privilege AWS IAM policies through a template-based workflow.
Policy Sentry is an automated IAM policy generator that helps developers create least privilege AWS IAM policies through a template-based workflow.
TerraGoat is a deliberately vulnerable Terraform repository that demonstrates common cloud infrastructure misconfigurations for training and testing security tools.
TerraGoat is a deliberately vulnerable Terraform repository that demonstrates common cloud infrastructure misconfigurations for training and testing security tools.
A multi-account AWS security tool that identifies misconfigurations, provides real-time reporting, and performs automated remediation to establish secure cloud guardrails.
A multi-account AWS security tool that identifies misconfigurations, provides real-time reporting, and performs automated remediation to establish secure cloud guardrails.
Get strategic cybersecurity insights in your inbox
Real-time OSINT monitoring for leaked credentials, data, and infrastructure
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
AI security assurance platform for red-teaming, guardrails & compliance