Amazon Web Services (AWS)
Amazon Web Services provides a comprehensive range of cloud services, including computing, storage, databases, and AI, supporting businesses of all sizes.
Understand security responsibilities
See how security tasks are shared between you and Amazon Web Services to ensure your cloud environment is protected.
Native security products
- AWS Cloud Security
- Integrated tools for AWS environments covering access control, threat detection, data protection, and compliance. Includes network, application, and identity security features.
Open-source projects
- Altimeter
- Cloud resource mapping tool for AWS, visualizing infrastructure and ensuring compliance through relationship analysis.
- AWS Firewall Factory
- Framework for deploying and managing AWS Network Firewall configs across multiple accounts and regions.
- Cartography
- Multi-cloud asset mapping tool for visualizing relationships and supporting security assessments across services.
- Chainloop
- Supply chain security platform managing artifacts and verifying policies throughout the software development lifecycle.
- Checkov
- Static analysis tool scanning IaC frameworks like Terraform and Kubernetes to identify security misconfigurations.
- Cilium
- Cloud-native networking and security platform using eBPF for high-performance policy enforcement and observability.
- Cloudbeat
- Cloud asset and security posture monitoring tool providing visibility and alerting to enhance cloud security.
- CloudQuery
- SQL-based cloud asset inventory querying tool for security checks, compliance management, and cost analysis.
- CloudSploit
- Cloud security scanner identifying misconfigurations and permission risks across multiple cloud services.
- DefectDojo
- Vulnerability management platform for tracking security findings and streamlining remediation processes across environments.
- Falco
- Runtime security monitor for Kubernetes and containers, detecting abnormal behaviors and enforcing policies.
- Fix Inventory
- Compliance and asset inventory tool identifying misconfigurations and security risks in cloud environments.
- KubeArmor
- Kubernetes runtime security enforcer monitoring and enforcing policies on system calls, network, and file operations.
- Kubescape
- Kubernetes security posture management tool scanning clusters against compliance frameworks and best practices.
- Magpie
- Cloud data discovery tool identifying, classifying, and securing data assets across cloud storage services.
- OpenVAS Scanner
- Comprehensive vulnerability scanner assessing network security and generating detailed risk reports.
- Prowler
- Multi-cloud security assessment tool for auditing best practices, compliance, and threat monitoring.
- S3Scanner
- Amazon S3 bucket security assessment tool identifying publicly accessible or misconfigured buckets.
- Sadcloud
- Security testing tool simulating misconfigurations and vulnerabilities in cloud environments for risk assessment.
- Scout Suite
- Multi-cloud security auditing tool analyzing configurations to find weaknesses across major cloud platforms.
- Steampipe
- SQL-based query tool for cloud services and APIs, aiding in infrastructure analysis and security assessments.
- ThreatMapper
- Runtime vulnerability scanner for cloud workloads, identifying and prioritizing risks in active services.
- Trivy
- Multi-platform security scanner for container images, file systems, and Git repositories, detecting vulnerabilities.
- Wazuh
- Comprehensive security monitoring platform for log analysis, threat detection, and compliance management.
- ZeusCloud
- Cloud security posture management platform offering visibility, compliance checks, and security recommendations.