
aws-iam-authenticator
A tool to use AWS IAM credentials to authenticate to a Kubernetes cluster
Discover and compare 596 cloud security solutions for AWS, Azure, GCP and multi-cloud environments.
A tool to use AWS IAM credentials to authenticate to a Kubernetes cluster
A security management platform that integrates modules for Assets, Risks, and Alerts, ensuring proactive threat detection and real-time incident response.
Kubernetes Goat is a "Vulnerable by Design" cluster environment to learn and practice Kubernetes security using an interactive hands-on playground
Datadog Serverless Monitoring provides visibility into serverless architectures, particularly AWS Lambda, addressing operational and security challenges.
The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.
A cloud-native solution for securing serverless applications in AWS and Azure environments.
A toolkit for enumerating and exploiting vulnerabilities in Azure cloud environments.
A monitoring and logging solution tailored for serverless architectures, addressing unique security challenges.
IAM Least Privilege Policy Generator
A security solution for serverless architectures that monitors and scans application dependencies for vulnerabilities.
Cloudsplaining is an AWS IAM Security Assessment tool that identifies violations of least privilege and generates a risk-prioritized report.
Thundra.io is a platform that addresses security and operational challenges in cloud-native applications, especially those built on serverless architectures and microservices.