Cloud Inquisitor Logo

Cloud Inquisitor

0
Free
Visit Website

Cloud Inquisitor can be used to improve the security posture of your AWS footprint through: monitoring AWS objects for ownership attribution, notifying account owners of unowned objects, and subsequently removing unowned AWS objects if ownership is not resolved. detecting domain hijacking. verifying security services such as Cloudtrail and VPC Flowlogs. managing IAM policies across multiple accounts. Please see the official docs here for more information on how to deploy, configure and operate Cloud Inquisitor in your environment.

FEATURES

ALTERNATIVES

A collection of tools for forensics teams to collect evidence from cloud platforms

Learn how to secure applications in Kubernetes Engine by granting varying levels of privilege based on requirements.

A tool that determines what AWS API calls are logged by CloudTrail and what they are logged as, and can also be used as an attack simulation framework.

A cloud security platform that combines Kubernetes security scanning, runtime monitoring, and cloud security posture management using Kubescape and eBPF technology.

Commercial

Open-source policy-as-code software for multi-cloud and SaaS environments with GPT model conversations and custom analysis policies.

A tool for building Open Container Initiative (OCI) container images with various functionalities.

Kube-bench is a tool for checking Kubernetes security based on CIS Kubernetes Benchmark.

A set of tools for fingerprinting and exploiting Amazon cloud infrastructures

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved