Plerion is a cloud security platform that combines multiple security capabilities into a unified solution for cloud infrastructure protection. The platform provides several key functionalities: Asset Inventory Management: - Tracks and maintains inventory of cloud resources - Enables querying and visualization of cloud assets - Supports multiple cloud providers including AWS, Azure, GCP, and Kubernetes Security Assessment: - Performs configuration auditing for cloud resources - Identifies misconfigurations and security vulnerabilities - Conducts infrastructure as code (IaC) scanning - Analyzes cloud workload vulnerabilities Access Control and Permissions: - Implements Cloud Infrastructure Entitlement Management (CIEM) - Monitors identity and access permissions - Maps potential attack paths through identity relationships Compliance and Risk Management: - Monitors compliance with security standards - Generates compliance reports - Provides risk scoring and prioritization - Creates Software Bill of Materials (SBOM) Integration Capabilities: - Connects with common development and operations tools - Supports integration with Slack, Jira, PagerDuty, and other platforms - Offers API access for custom integrations The platform operates through cloud-native deployment without requiring agent installation and focuses on identifying critical security risks while filtering out less significant issues.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
LambdaGuard is an AWS Lambda auditing tool that provides security configuration checks, statistical analysis, and service dependency mapping for serverless functions.
HAWK is a multi-cloud antivirus scanning API that uses CLAMAV and YARA engines to detect malware in AWS S3, Azure Blob Storage, and GCP Cloud Storage objects.
Cloudmarker is a configurable cloud monitoring tool and framework that audits Azure and GCP environments by retrieving, analyzing, and alerting on cloud security data.
A command-line security auditing tool that performs Lynis-based security assessments across AWS, GCP, Azure, and DigitalOcean cloud platforms.
FestIn discovers open S3 buckets associated with a domain using crawling and DNS reconnaissance techniques.
A tutorial demonstrating how to implement Kubernetes Engine security features to control application privileges through host access controls and network access policies.
A Docker security vulnerability where disabling inter-container communication (ICC) fails to block raw ethernet frames, allowing unexpected data transfer between containers via raw sockets.
TerraGoat is a deliberately vulnerable Terraform repository that demonstrates common cloud infrastructure misconfigurations for training and testing security tools.
SkyWrapper analyzes temporary token behaviors in AWS accounts to detect suspicious activities and generates Excel reports with findings summaries.