-
Updated
Jul 10, 2019
#
cloud-security
Here are 110 public repositories matching this topic...
Free Security and Hacking eBooks
security
hacking
forensics
penetration-testing
ebooks
kali-linux
cyber-security
cloud-security
hacking-ebooks
hackers-handbook
A Central Control Plane for AWS Permissions and Access
-
Updated
Dec 21, 2021 - Python
Kubernetes Goat 🐐 is a "Vulnerable by Design" Kubernetes Cluster. Designed to be an intentionally vulnerable cluster environment to learn and practice Kubernetes security 🔐
docker
kubernetes
infrastructure
security
microservices
helm
container
hacking
owasp
cloud-native
pentesting
cloudsecurity
devsecops
cloud-security
container-security
vulnerable-app
kubernetes-security
kubernetes-goat
-
Updated
Aug 6, 2021 - HTML
kmcquade
commented
Apr 12, 2021
- There are still mentions of a triage worksheet. "Cloudsplaining identifies violations of least privilege in AWS IAM policies and generates a pretty HTML report with a triage worksheet. It can scan all the policies in your AWS account or it can scan a single policy file." The worksheet is mentioned several times.
- As shown in the above, there is no mention of multiple AWS accounts
- The GIF st
1
marshmallowrobot
commented
Nov 10, 2020
Summary
Dependabot has identified several security vulnerabilities in the 3rd party libraries Pacbot relies on. In most cases, these vulnerabilities can be resolved by upgrading the library to the most current version.
Maintainers, if you're internal to T-Mobile, you should have been seeing these security alerts coming in over the last several weeks. *Please respond to these in a timely ma
Cloud Security Suite - One stop tool for auditing the security posture of AWS/GCP/Azure infrastructure.
security
security-audit
azure
gcp
aws-security
security-tools
cloud-security
azure-security
aws-audit
gcp-audit-report
azure-audit
-
Updated
Nov 4, 2021 - Shell
TerraGoat is Bridgecrew's "Vulnerable by Design" Terraform repository. TerraGoat is a learning and training project that demonstrates how common configuration errors can find their way into production cloud environments.
-
Updated
Dec 21, 2021 - HCL
SkyArk helps to discover, assess and secure the most privileged entities in Azure and AWS
-
Updated
Mar 17, 2021 - PowerShell
Open source device management, built on osquery.
open-source
security
osquery
host-instrumentation
device-management
cloud-security
mac-administration
it-ops
endpoint-security
endpoint-monitoring
it-admin
endpoint-manager
-
Updated
Dec 22, 2021 - Go
Awesome cloud enumerator
digitalocean
google
cloud
amazon
linode
hacking
cloud-storage
s3-bucket
infosec
pentesting
bugbounty
vultr
pentest-tool
cloud-security
redteam
-
Updated
Jul 5, 2021 - Go
Continuously monitor your AWS services for configurations that can lead to degradation of confidentiality, integrity or availability. All results will be sent to Security Hub for further aggregation and analysis.
aws
security-audit
automation
monitoring
terraform
audit
security-hardening
aws-security
risk-management
monitoring-tool
security-tools
soar
security-engineering
cloud-security
cloud-auditing
security-monitoring
well-architected
cloud-compliance-reporting
security-hub
continuous-compliance
-
Updated
Dec 13, 2021 - Python
A Huge Learning Resources with Labs For Offensive Security Players
api
infrastructure
learning
security
mobile
web
hack
hacking
owasp
cybersecurity
web-security
mobile-security
offensive
offensive-security
red-team
owasp-top-10
cloud-security
redteam
api-security
red-teaming
-
Updated
Nov 17, 2021
Find cloud assets that no one wants exposed 🔎 ☁️
aws
cloud
api-documentation
penetration-testing
infosec
blueteam
security-tools
cloud-security
attack-surface
amazonaws
security-engineer
-
Updated
Jul 20, 2020 - Go
Cloud security monitoring tool and framework
slack
security
elasticsearch
security-audit
cloud
mongodb
splunk
azure
email
google-cloud-platform
security-tools
cloud-security
cloud-security-audit
-
Updated
Jun 1, 2021 - Python
Curated list of links, references, books videos, tutorials (Free or Paid), Exploit, CTFs, Hacking Practices etc. which are related to AWS Security
aws
security
awesome-list
aws-security
security-tools
awesome-lists
cloud-security
aws-auditing
aws-security-resources
-
Updated
Nov 12, 2021
Identity & Access Management simplified and secure.
-
Updated
Nov 23, 2021 - Go
Automatically compile an AWS Service Control Policy that ONLY allows AWS services that are compliant with your preferred compliance frameworks.
-
Updated
Dec 2, 2021 - Python
Cloud Security Operations Orchestrator
cloud
machinelearning
security-incidents
security-automation
cloud-security
security-analytics
python-automation
security-analyst
terraform-security
response-orchestration
-
Updated
Dec 1, 2021 - Python
awesome resources about cloud native security 🐿
docker
kubernetes
serverless
container
cloud-computing
k8s
cloud-native
cloud-security
docker-security
container-security
serverless-security
kubernetes-security
container-escape
cloud-native-security
-
Updated
Dec 19, 2021
Curated list of awesome cloud security blogs, podcasts, standards, projects, and examples.
aws
security
elasticsearch
nist
awesome
cloud
logging
waf
awesome-list
information-security
aws-security
dlp
iso27001
ccm
nist800-53
cloud-security
data-loss-prevention
security-standards
iso27017
iso-27017
-
Updated
Aug 3, 2021
Secret management toolchain
kubernetes
golang
yaml
cloud
encryption
pipeline
consul
vault
secret-management
cloud-storage
zookeeper
golang-library
unix-command
secret-storage
unix-philosophy
cloud-security
etcdv3
kv-store
gitops
paseto
-
Updated
Dec 15, 2021 - Go
A step-by-step walkthrough of CloudGoat 2.0 scenarios.
-
Updated
Apr 28, 2020
A Docker container for remote penetration testing.
-
Updated
Mar 16, 2021 - HCL
Prevent SSRF attacks on AWS EC2 via automated upgrades to the more secure Instance Metadata Service v2 (IMDSv2).
-
Updated
Dec 17, 2021 - Python
aws
security
azure
gcp
cybersecurity
cloud-computing
aws-security
cloud-security
azure-security
gcp-security
-
Updated
Oct 14, 2021
Monitor the internet attack surface of various public cloud environments. Currently supports AWS, GCP, Azure, DigitalOcean and Oracle Cloud.
aws
digitalocean
serverless
azure
api-gateway
dynamodb
lambda-functions
gcp
oracle
cybersecurity
serverless-framework
cyber-security
aws-security
cloudsecurity
cloud-security
azure-security
gcp-security
shadowrisk
shadow-risk
-
Updated
Oct 6, 2021 - Python
Выпускная квалификационная работа (ВКР) магистра в LaTeX, оформленная в соответствии с нормоконтролем Севастопольского государственного университета в 2017 г.
-
Updated
Nov 17, 2021 - TeX
Improve this page
Add a description, image, and links to the cloud-security topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the cloud-security topic, visit your repo's landing page and select "manage topics."
Enhancement Request
Other security scanning tools (e.g.
checkovandtfsec) have a--soft-failflag or equivalent option that allows you to always exit with 0 status.Extremely useful when running the tool without halting a pipeline for example.
I currently use a workaround, but something more concrete would be very desira