Your secret keeper. Stores secrets in DynamoDB, encrypted at rest. Docs: Installation Configuration Usage Contribution Reporting security vulnerabilities: If you've found a vulnerability or a potential vulnerability in Confidant please let us know at security@lyft.com. Getting support or asking questions: We have a mailing list for discussion, and a low volume list for announcements: https://groups.google.com/forum/#!forum/confidant-users https://groups.google.com/forum/#!forum/confidant-announce We also have an IRC channel on freenode and a Gitter channel: #confidant lyft/confidant on Gitter Feel free to drop into either Gitter or the IRC channel for any reason, even if just to chat.
FEATURES
SIMILAR TOOLS
A powerful tool that enables organizations to discover, manage, and secure privileged access, helping to reduce the risks associated with privileged accounts and activities.
A tool for privilege escalation within Linux environments by targeting vulnerabilities in SUDO usage.
Okta Customer Identity Cloud is a CIAM solution that provides secure, customizable identity management for consumer and SaaS applications.
AWS IAM Access Analyzer is a tool for implementing and maintaining least privilege access in AWS environments through automated analysis and validation of IAM policies and permissions.
A tool that generates least privilege IAM policies for AWS services
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.