Cloud Security Research releases written by the Rhino Security Labs team. These articles provide in-depth analysis and insights on various cloud security topics, including AWS, Azure, and Google Cloud Platform. The articles cover a wide range of topics, from security best practices to vulnerability assessments and penetration testing. The goal of these articles is to educate and inform cloud security professionals on the latest threats and mitigation strategies. The articles are written by experienced security professionals with a deep understanding of cloud security. The articles are available for free on the Rhino Security Labs website.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
DataCop is a custom AWS framework for mitigating S3 bucket attack vectors based on customer configuration.
A script and library for identifying risks in AWS IAM configuration
A cloud native security platform that uses behavioral fingerprinting and runtime verification to detect threats across Kubernetes environments, cloud infrastructure, and software supply chains.
Show the history and changes between configuration versions of AWS resources
AWS Scout2 is a security tool for AWS administrators to assess their environment's security posture.
A fully managed service that securely stores, rotates, and manages sensitive data such as database credentials and API keys.
A tool for building Open Container Initiative (OCI) container images with various functionalities.
A cloud security solution that provides agentless application mapping and vulnerability prioritization based on business impact across cloud environments.
Converts the format of various S3 buckets for bug bounty and security testing.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.