AWS Security Workshops: A collection of security workshops and hands-on content for AWS security services, techniques, and best practices. These workshops provide a deep dive into various AWS security services and techniques, and guide you through prepared scenarios that represent common use cases and security operational tasks. Visit the workshop portal to get started: https://awssecworkshops.com
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A Python script that lists all main resources of your AWS account, helping you find resources that affect billing and/or security.
gVisor is an application kernel that provides isolation for running sandboxed containers.
Azure Guardrails enables rapid enforcement of cloud security guardrails by generating Terraform files for Azure Policy Initiatives.
A tool that discovers all AWS resources created in an account
Lists AWS resources using the AWS Cloud Control API and writes them to a JSON output file.
A cloud and database asset intelligence platform that provides continuous monitoring, compliance management, and security posture assessment across hybrid cloud environments.
A framework for executing attacker actions in the cloud with YAML-based format for defining TTPs and detection properties, deployable via AWS-native CI/CD pipeline.
Cloud runtime security platform that uses eBPF technology to monitor cloud infrastructure, detect anomalies, and identify potential security threats in real-time.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.