Cloud Inquisitor Logo

Cloud Inquisitor

0
Free
Visit Website

Cloud Inquisitor can be used to improve the security posture of your AWS footprint through: monitoring AWS objects for ownership attribution, notifying account owners of unowned objects, and subsequently removing unowned AWS objects if ownership is not resolved. detecting domain hijacking. verifying security services such as Cloudtrail and VPC Flowlogs. managing IAM policies across multiple accounts. Please see the official docs here for more information on how to deploy, configure and operate Cloud Inquisitor in your environment.

FEATURES

ALTERNATIVES

Analyzes CloudTrail data of a given AWS account and generates a summary of recently active IAM principals, API calls they made, as well as regions, IP addresses and user agents they used.

AWS serverless cloud security tool for parsing and alerting on CloudTrail logs using EQL.

A tool for testing AWS S3 bucket permissions and security

A detection-as-code platform for streamlining cloud security operations and responding to security incidents.

Open-source cloud-agnostic resource manager for analyzing and managing cloud cost, usage, security, and governance.

Cloud Custodian (c7n) is a rules engine for managing public cloud accounts and resources with a focus on security, compliance, and cost optimization.

Cloudmarker is a cloud monitoring tool and framework that audits Azure and GCP cloud environments.

A customized AWS EKS setup for PCI-DSS, SOC2, and HIPAA compliance

PINNED