KICS (Keeping Infrastructure as Code Secure) is an open-source security scanning tool designed to analyze Infrastructure as Code (IaC) configurations for security vulnerabilities and misconfigurations. The tool operates through customizable heuristic rules called queries that can be edited, extended, and added to meet specific security requirements. KICS features a modular architecture that enables support for multiple Infrastructure as Code solutions. Key capabilities include: - Static analysis of IaC templates and configurations - Detection of security issues and compliance violations - Integration with CI/CD pipelines for automated security scanning - Extensible query system for custom security rules - Support for various cloud-native and infrastructure technologies The tool provides structured output results that help identify and remediate detected security issues. KICS is designed for cloud-native projects and can be integrated into development workflows to ensure infrastructure security from the early stages of deployment.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
CloudSploit by Aqua is an open-source multi-cloud security scanning tool that detects security risks and compliance issues across AWS, Azure, GCP, OCI, and GitHub platforms.
Kube-bench is a security assessment tool that validates Kubernetes deployments against CIS Kubernetes Benchmark standards through automated configuration checks.
A deprecated Kubernetes workload policy enforcement tool that helped secure multi-tenant clusters through various security policies and configurations.
AWS Vault securely stores AWS IAM credentials in the operating system's keystore and generates temporary credentials for development environments.
A setuid implementation of user namespaces that enables running unprivileged containers without root privileges as a secure alternative to traditional container runtimes.
TerraGoat is a deliberately vulnerable Terraform repository that demonstrates common cloud infrastructure misconfigurations for training and testing security tools.
FestIn discovers open S3 buckets associated with a domain using crawling and DNS reconnaissance techniques.
A command-line security auditing tool that performs Lynis-based security assessments across AWS, GCP, Azure, and DigitalOcean cloud platforms.
A Docker security vulnerability where disabling inter-container communication (ICC) fails to block raw ethernet frames, allowing unexpected data transfer between containers via raw sockets.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.