
kubectl-who-can
Show who has RBAC permissions to perform actions on different resources in Kubernetes
Discover and compare 596 cloud security solutions for AWS, Azure, GCP and multi-cloud environments.
Show who has RBAC permissions to perform actions on different resources in Kubernetes
A data security platform that protects sensitive data in a perimeter-less environment using the Trusted Data Format (TDF) standard.
WeirdAAL (AWS Attack Library) is a toolkit designed to assess and exploit potential vulnerabilities in AWS environments.
A cloud-hosted Hardware Security Module (HSM) service for managing and protecting sensitive encryption keys.
Create a break glass role for emergency use in AWS to limit access and configure alerts and logging for secure usage.
A data security solution for protecting sensitive data across various environments.
Web security protection system based on openresty
A data security solution for multi-cloud and SaaS environments, focusing on visibility and control over sensitive data.
A bridge between SFTP and Google Cloud Storage (GCS) that allows users to access GCS buckets via SFTP and sync files between them.
Google Cloud Key Management Service (KMS) provides a secure and efficient way to manage encryption keys in cloud environments, ensuring data security and compliance with regulatory standards.
AWS Auditing & Hardening Tool
Entrust nShield HSMs provide secure cryptographic key management in sensitive environments, ensuring compliance and tamper resistance.