Krampus Logo

Krampus

0
Free
Visit Website

Krampus is a security solution designed to delete and disable various AWS objects such as EC2 instances, S3 buckets, etc. It accepts a simple list of objects to action in the form of a JSON tasks file, and can also be used as a cost-control tool. Krampus itself is designed to eliminate threats post by security issues, and does not actually decide whether something is insecure. For that we recommend Netflix's Security Monkey. Setting up Krampus is generally pretty simple and should only take a few minutes. It can be run locally from the command line or from Lambda in AWS. The process involves setting up the correct IAM permissions for Krampus to run, and using a method of your choice to populate an S3 bucket with a JSON tasks file that Krampus can understand (see Tasks and Whitelist Setup). The flow chart below demonstrates how we have chosen to set this up, though any method that generates a tasks file Krampus can understand should be fine. Krampus utilizes a tasks file as well as a whitelist file to understand which resources to action on, what action to perform, and which resources/accounts that should be avoided.

FEATURES

ALTERNATIVES

Azure Guardrails enables rapid enforcement of cloud security guardrails by generating Terraform files for Azure Policy Initiatives.

Conmachi is a Golang tool for scanning container environments for security issues.

Cloud runtime security platform that uses eBPF technology to monitor cloud infrastructure, detect anomalies, and identify potential security threats in real-time.

Commercial

Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.

Commercial

Detect off-instance key usage in AWS by analyzing CloudTrail files locally.

A CLI tool and Go library for generating a Software Bill of Materials (SBOM) from container images and filesystems.

A set of tools for fingerprinting and exploiting Amazon cloud infrastructures

Learn how to secure applications in Kubernetes Engine by granting varying levels of privilege based on requirements.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved