Cloud Custodian (c7n) Logo

Cloud Custodian (c7n)

0
Free
Visit Website

Cloud Custodian, also known as c7n, is a rules engine for managing public cloud accounts and resources. It allows users to define policies to enable a well-managed cloud infrastructure, that's both secure and cost-optimized. It consolidates many of the adhoc scripts organizations have into a lightweight and flexible tool, with unified metrics and reporting. Custodian can be used to manage AWS, Azure, and GCP environments by ensuring real-time compliance to security policies (like encryption and access requirements), tag policies, and cost management via garbage collection of unused resources and off-hours resource management. Custodian also supports running policies on infrastructure as code assets to provide feedback directly on developer workstations or within CI pipelines. Custodian policies are written in simple YAML configuration files that enable users to specify policies on a resource type (EC2, ASG, Redshift, CosmosDB, PubSub Topic) and are constructed from a vocabulary of filters and actions. It integrates with the cloud-native serverless capabilities of each provider to provide for real-time enforcement of policies with built-in provisioning.

FEATURES

ALTERNATIVES

A CLI tool and Go library for generating a Software Bill of Materials (SBOM) from container images and filesystems.

A cloud and database asset intelligence platform that provides continuous monitoring, compliance management, and security posture assessment across hybrid cloud environments.

Commercial

Azucar is a multi-threaded plugin-based tool for assessing Azure Cloud security.

ScubaGear assesses Microsoft 365 tenant configurations against CISA Secure Configuration Baselines, using PowerShell and Open Policy Agent to compare settings and generate compliance reports.

FunctionShield is a Serverless Security Library for Developers to enforce strict security controls on AWS Lambda & Google Cloud Functions runtimes.

Automate actions on Security Command Center findings with automated disk snapshots, IAM grant revocation, and more.

Learn how to secure applications in Kubernetes Engine by granting varying levels of privilege based on requirements.

A tool to analyze and audit AWS environments for security issues and misconfigurations.

PINNED