Cloud Custodian (c7n) Logo

Cloud Custodian (c7n)

0
Free
Visit Website

Cloud Custodian, also known as c7n, is a rules engine for managing public cloud accounts and resources. It allows users to define policies to enable a well-managed cloud infrastructure, that's both secure and cost-optimized. It consolidates many of the adhoc scripts organizations have into a lightweight and flexible tool, with unified metrics and reporting. Custodian can be used to manage AWS, Azure, and GCP environments by ensuring real-time compliance to security policies (like encryption and access requirements), tag policies, and cost management via garbage collection of unused resources and off-hours resource management. Custodian also supports running policies on infrastructure as code assets to provide feedback directly on developer workstations or within CI pipelines. Custodian policies are written in simple YAML configuration files that enable users to specify policies on a resource type (EC2, ASG, Redshift, CosmosDB, PubSub Topic) and are constructed from a vocabulary of filters and actions. It integrates with the cloud-native serverless capabilities of each provider to provide for real-time enforcement of policies with built-in provisioning.

FEATURES

ALTERNATIVES

Analyzes CloudTrail data of a given AWS account and generates a summary of recently active IAM principals, API calls they made, as well as regions, IP addresses and user agents they used.

Cloud Security Dashboard with AWS CIS Security Benchmarks and JIRA integration.

Multi-cloud OSINT tool for enumerating public resources in AWS, Azure, and Google Cloud.

Discover and understand the Docker Layer 2 ICC Bug and its implications on inter-container communication.

Open source multi-cloud security-auditing tool for assessing security posture of cloud environments.

A framework for executing attacker actions in the cloud with YAML-based format for defining TTPs and detection properties, deployable via AWS-native CI/CD pipeline.

A comprehensive cloud security platform that combines vulnerability management, compliance monitoring, and automated remediation capabilities through an agentless architecture to protect cloud infrastructure and applications.

Commercial

Lists Amazon S3 Buckets while browsing