kubectl-who-can
Show who has RBAC permissions to perform actions on different resources in Kubernetes
Discover and compare 596 cloud security solutions for AWS, Azure, GCP and multi-cloud environments.
Show who has RBAC permissions to perform actions on different resources in Kubernetes
Akamai's security solutions provide a multilayered defense strategy to protect IT ecosystems from cyber threats.
Automated Security Response on AWS is an add-on solution that works with AWS Security Hub to provide a ready-to-deploy architecture and a library of automated playbooks.
Lacework addresses the complex security and operational challenges in cloud environments through its cloud workload protection platform (CWPP) and cloud-native security architecture.
WeirdAAL (AWS Attack Library) is a toolkit designed to assess and exploit potential vulnerabilities in AWS environments.
A security solution for hybrid cloud environments, integrating multiple security services for enhanced protection.
A framework for orchestrating forensic collection, processing and data export
A cloud-delivered security service edge platform that protects users and data in a hybrid workforce environment.
Create a break glass role for emergency use in AWS to limit access and configure alerts and logging for secure usage.
A unified platform for threat detection, investigation, and response, addressing fragmented security data.
Web security protection system based on openresty
An AI-powered solution for managing and responding to security threats in real-time, integrating OpenAI's GPT-4 with Microsoft security models.