CloudMapper helps you analyze your Amazon Web Services (AWS) environments. It now contains much more functionality, including auditing for security issues. Commands: * audit: Check for potential misconfigurations. * collect: Collect metadata about an account. * find_admins: Look at IAM policies to identify admin users and roles, or principals with specific privileges. * find_unused: Look for unused resources in the account. Finds unused Security Groups, Elastic IPs, network interfaces, volumes and elastic load balancers. * prepare/webserver: See Network Visualizations * public: Find public hosts and port ranges. * sg_ips: Get geoip info on CIDRs trusted in Security Groups. * stats: Show counts of resources for accounts. * weboftrust: Show Web Of Trust.
FEATURES
SIMILAR TOOLS
Cloud Security Suite (cs-suite) - Version 3.0 Usage for cloud security audits on AWS, GCP, Azure, and DigitalOcean.
A customized AWS EKS setup for PCI-DSS, SOC2, and HIPAA compliance
Gatekeeper is a policy management tool for Kubernetes that provides an extensible, parameterized policy library and native Kubernetes CRDs for instantiating and extending the policy library.
A Lambda Function that disables AWS IAM User Access Keys after a set amount of time to reduce the risk associated with old access keys.
A collection of security workshops and hands-on content for AWS security services and techniques
Multi-cloud OSINT tool for enumerating public resources in AWS, Azure, and Google Cloud.
A cloud-native application protection platform that provides comprehensive security monitoring, vulnerability management, and threat detection for cloud environments and container workloads.
gVisor is an application kernel that provides isolation for running sandboxed containers.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.