-
Updated
Jul 10, 2019
#
cloud-security
Here are 41 public repositories matching this topic...
Free Security and Hacking eBooks
security
hacking
forensics
penetration-testing
ebooks
kali-linux
cyber-security
cloud-security
hacking-ebooks
hackers-handbook
museadmin
commented
Nov 23, 2018
At the moment EC2 audit is raising an issue that I cannot investigate because of the lack of detail:
Warning: VPC has en exposed enpoint
Warning: VPC has en exposed enpoint
Warning: VPC has en exposed enpoint
Warning: VPC has en exposed enpoint
Warning: VPC has en exposed enpoint
Warning: VPC has an exposed enpoint
Warning: VPC has en exposed enpoint
Warni
Kubernetes Goat is "Vulnerable by Design" Kubernetes Cluster.
docker
kubernetes
infrastructure
security
microservices
container
hacking
pentesting
cloud-security
vulnerable-app
-
Updated
Jun 20, 2020 - HTML
TerraGoat is Bridgecrew's "Vulnerable by Design" Terraform repository. TerraGoat is a learning and training project that demonstrates how common configuration errors can find their way into production cloud environments.
-
Updated
Jun 19, 2020 - HCL
jonrau1
commented
Mar 13, 2020
Story
As a user of ElectricEye, I want to be able to run security scans against my Amazon LightSail Virtual Private Servers (VPS) so that I can know their security posture and/or fulfill regulatory or compliance requirements
Definition of Done
- New Auditor created for LightSail
- IAM Policies update in CFN, TF and standalone
- Readme list updated with new Auditor checks
- Total co
SkyArk helps to discover, assess and secure the most privileged entities in Azure and AWS
-
Updated
Mar 16, 2020 - PowerShell
Curated list of awesome cloud security blogs, podcasts, standards, projects, and examples.
aws
security
elasticsearch
nist
awesome
cloud
logging
waf
awesome-list
information-security
aws-security
dlp
iso27001
ccm
nist800-53
cloud-security
data-loss-prevention
security-standards
iso27017
iso-27017
-
Updated
Jun 6, 2017
Выпускная квалификационная работа (ВКР) магистра в LaTeX, оформленная в соответствии с нормоконтролем Севастопольского государственного университета в 2017 г.
-
Updated
Mar 10, 2020 - TeX
A step-by-step walkthrough of CloudGoat 2.0 scenarios.
-
Updated
Apr 28, 2020
Security tool to quickly audit Public Box files and folders.
-
Updated
Sep 29, 2019 - Python
Cybersecurity notes, links, references etc.
-
Updated
May 4, 2020
tls
ssh
security
devops
security-audit
cloud
books
book
network
vps
hacking
webapp
network-security
web-application-security
devsecops
vps-security
cloud-security
security-review
security-testing
-
Updated
Aug 2, 2019
Cloud security projects with Spring Cloud Config Server and Vault
-
Updated
Jun 14, 2020 - Java
Docker container bundling tools for manual AWS security reviews
docker
dockerfile
aws
security
alpine
s3
audit
cloud-computing
aws-security
security-tools
cloud-security
-
Updated
Sep 12, 2018 - Python
A carefully curated list of open source projects aimed at improving your AWS security posture!
-
Updated
May 30, 2019
Proof of Value Terraform Scripts to utilize Amazon Web Services (AWS) Security, Identity & Compliance Services to Support your AWS Account Security Posture.
python
aws
devops
lambda
automation
modules
terraform
waf
secops
kinesis-firehose
compliance
aws-cognito
aws-config
remediation
devsecops
cloud-security
aws-xray
aws-glue
guardduty
security-hub
-
Updated
Apr 26, 2020 - HCL
AWS IAM Analysis utility to gather entire useful information from an AWS account
-
Updated
May 29, 2020 - Python
This CircleCI Orb Action runs Bridgecrew analysis of Infrastructure-as-Code repository. Bridgecrerw performs static security analysis of Terraform, CloudFormation and Kubernetes Infrastructure code security
-
Updated
May 5, 2020
AWS KMS Tour for secrets code
-
Updated
Dec 21, 2019 - Jupyter Notebook
AWS IAM Security Toolkit: CIS Benchmarks | Enumeration | Privilege Escalation
bash
aws
automation
iam
aws-iam
aws-security
privilege-escalation
bash-scripting
cloud-security
cis-benchmark
aws-audit
cloud-auditing
misconfigurations
-
Updated
Apr 14, 2020 - Shell
awscli now asks for token code when used with MFA enabled IAM accounts.
python
plugin
cli
aws
security
aws-cli
mfa
cli-tool
cloud-security
aws-cli-utilities
multifactor-authentication
aws-cli-plugins
-
Updated
Aug 20, 2018 - Python
Um artigo escrito com amor por um entusiasta sobre os principais riscos em plataformas Cloud 😍 ☁️
-
Updated
Dec 7, 2019
tls
ssh
aws
csp
devops
books
dos
serverless
book
functions
application-security
network-security
devsecops
cloud-security
least-privilege
shared-responsibility-model
-
Updated
Dec 15, 2018
This is a sample cloud ids implementation using CloudLens, Snort and ELK. This sample complements the 3 part cloud ids blog series in https://www.ixiacom.com/company/blog/sample-cloud-ids-solution-part-3-series
-
Updated
Jun 12, 2019 - Python
NextSecurity Modified - Security auditing tool for Azure environments
security-audit
azure
powershell-script
microsoft-azure-powershell
security-automation
microsoft-azure
cloud-security
azure-security
nextsecurity
security-auditing-tool
cloud-security-audit
-
Updated
Jan 22, 2019 - PowerShell
mathieu-benoit
commented
Jul 18, 2019
- Waiting for https://github.com/Azure/aks-engine/projects/7
- https://github.com/aquasecurity/kube-bench
- Azure/AKS#367
- https://github.com/sabbour/kube-bench-aks/blob/master/cfg/1.11/config.yaml
- https://blog.aquasec.com/kubernetes-security-cis-benchmarks
kubectl run --rm -i -t kube-bench-node --image=sabbour/kube-bench-aks:latest --restart=Never --overri
Improve this page
Add a description, image, and links to the cloud-security topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the cloud-security topic, visit your repo's landing page and select "manage topics."
Any good docs on the code structure on how to add new providers there ? Code is slightly convoluted and it's quite hard to see what changes are required to add one - ideally, they'd be plugin-like structure bundled in one dir, aren't they yet ?