Perimeterator
A distributed AWS security auditing tool that continuously enumerates and scans internet-facing AWS services to identify potentially misconfigured resources.

Perimeterator
A distributed AWS security auditing tool that continuously enumerates and scans internet-facing AWS services to identify potentially misconfigured resources.
Perimeterator Description
Perimeterator is a distributed security auditing tool designed for continuous monitoring of internet-facing AWS services. The tool automatically enumerates public IP addresses associated with various AWS resources including EC2 instances, Elastic Load Balancers (ELB and ELBv2), RDS databases, and Elasticsearch clusters. The system operates through a distributed architecture using AWS SQS queues for asynchronous communication between components. It consists of scanner workers that can be deployed across different networks to simulate external access patterns and provide visibility into services as they appear from the general internet. The enumeration process identifies potentially misconfigured AWS resources that are exposed to the internet, then queues these targets for network service scanning. Scanner workers process items from the work queue to detect open network services on the identified IP addresses. Deployment is facilitated through provided Terraform configurations, allowing for quick setup within AWS environments. The tool supports continuous auditing workflows by periodically reassessing the attack surface of AWS infrastructure.
Perimeterator FAQ
Common questions about Perimeterator including features, pricing, alternatives, and user reviews.
Perimeterator is A distributed AWS security auditing tool that continuously enumerates and scans internet-facing AWS services to identify potentially misconfigured resources.. It is a Attack Surface solution designed to help security teams with AWS, Scanner.
ALTERNATIVES
Attack surface mgmt platform with vuln scanning and cloud security features
FestIn discovers open S3 buckets associated with a domain using crawling and DNS reconnaissance techniques.
A platform providing real-time threat intelligence streams and reports on internet-exposed assets to help organizations monitor and secure their attack surface.
A search engine for open Amazon S3 buckets and their contents, allowing users to search for files using keywords, filename extensions, and full path.
POPULAR
TRENDING CATEGORIES
Stay Updated with Mandos Brief
Get strategic cybersecurity insights in your inbox