Curated by practitioners, maintained by community PRs

Cloud Security Tool Directory

Browse high-signal tools mapped to real cloud security operations. Filter by domain, cloud, type, and compliance standards to find what fits your stack fast.

Total tools 60
Open source 51
Commercial 7
Multi-cloud 27

Find your fit

60 tools shown

Cloud IAM Auditing (15)IaC Security (11)Compliance as Code (9)CSPM (6)

Prowler

Open Source

Large benchmark coverage with pragmatic cloud misconfiguration checks.

CSPM AWS · Azure · GCP
SOC 2PCI DSSCIS

Wiz

Commercial

Graph-based cloud attack path visibility across workloads and identities.

CNAPP Multi
SOC 2HIPAAPCI DSSFedRAMP

Checkov

Open Source

Policy-as-code scanning for Terraform, Kubernetes, and CloudFormation.

IaC Security AWS · Azure · GCP
SOC 2PCI DSSCIS

tfsec

Open Source

Fast local Terraform static analysis with clear remediation output.

IaC Security AWS · Azure · GCP
CISPCI DSS

Snyk IaC

Freemium

Developer-first IaC checks tightly integrated into pull request flow.

IaC Security AWS · Azure · GCP
SOC 2HIPAAPCI DSS

Falco

Open Source

Runtime threat detection for containers and Kubernetes workloads.

Container Security Multi
SOC 2NIST

Syft

Open Source

Developer-friendly SBOM generator with broad package ecosystem support.

SBOM & Supply Chain Multi
NISTFedRAMP

Grype

Open Source

Vulnerability scanner designed to pair directly with generated SBOMs.

SBOM & Supply Chain Multi
NISTPCI DSS

Permiso

Commercial

Identity-centric detection focused on cloud service account abuse.

Cloud IAM Auditing AWS · Azure · GCP
SOC 2FedRAMP

Steampipe

Open Source

Query cloud APIs with SQL for rapid compliance checks and dashboards.

Compliance as Code Multi
SOC 2NISTPCI DSS

aws-nuke

Open Source

Automates safe teardown of AWS resources to enforce clean account baselines.

Compliance as Code AWS
NISTSOC 2

Pacu

Open Source

AWS exploitation framework for testing IAM abuse paths and cloud misconfigurations.

Cloud IAM Auditing AWS
NISTCIS

CloudGoat

Open Source

Purpose-built AWS scenarios for validating detection and IAM attack-path readiness.

Cloud IAM Auditing AWS
NISTSOC 2

Terragoat

Open Source

Deliberately vulnerable Terraform stack for testing IaC misconfiguration detection.

IaC Security AWS
NISTCIS

Parliament

Open Source

Lints IAM policies to catch privilege, wildcard, and risky permission issues early.

Cloud IAM Auditing AWS
CISNISTSOC 2

CloudTracker

Open Source

Compares CloudTrail activity to granted IAM permissions to spot over-privileged identities.

Cloud IAM Auditing AWS
NISTSOC 2

SkyArk

Open Source

Finds and assesses highly privileged AWS entities that increase account takeover risk.

Cloud IAM Auditing AWS
CISNISTSOC 2

CloudQuery

Open Source

Extracts cloud configuration data into SQL tables for policy checks and reporting.

Compliance as Code Multi
NISTPCI DSSSOC 2

cdk-nag

Open Source

Applies security and compliance rules to AWS CDK constructs during development.

IaC Security AWS
CISNISTSOC 2

kube-bench

Open Source

Runs CIS Kubernetes benchmark checks against cluster nodes and control planes.

Container Security Multi
CISNIST

kube-hunter

Open Source

Performs active reconnaissance to identify exposed Kubernetes security weaknesses.

Container Security Multi
NISTCIS

Kubescape

Open Source

Kubernetes posture scanner with framework mappings and risk prioritization guidance.

Container Security Multi
NISTCISSOC 2

Peirates

Open Source

Simulates common Kubernetes-to-cloud privilege escalation paths in AWS environments.

Cloud IAM Auditing AWS
NISTCIS

KICS

Open Source

Static analysis engine for Terraform, Kubernetes, and other IaC formats.

IaC Security Multi
CISNISTSOC 2

Terrascan

Open Source

Policy-based IaC scanner with broad cloud provider and framework coverage.

IaC Security Multi
CISNISTPCI DSS

cfn-nag

Open Source

Lints CloudFormation templates to detect risky security configurations before deploy.

IaC Security AWS
CISNISTSOC 2

Kyverno

Open Source

Kubernetes-native policy engine for enforceable guardrails and admission controls.

Compliance as Code Multi
NISTSOC 2PCI DSS

Kubewarden

Open Source

Admission policy framework using WebAssembly for portable Kubernetes enforcement.

Compliance as Code Multi
NISTCIS

shhgit

Open Source

Real-time GitHub secret monitoring to quickly surface exposed credentials.

Secrets Scanning Multi
SOC 2NIST

Cloud-Nuke

Open Source

Deletes cloud resources at scale to enforce clean account baselines and reduce stale attack surface.

Compliance as Code AWS
NISTSOC 2CIS

iam-floyd

Open Source

Generates AWS IAM policies programmatically with a fluent interface to reduce policy authoring mistakes.

Cloud IAM Auditing AWS
NISTCIS

cloudfox

Open Source

Enumerates cloud attack paths and identity exposure from an attacker perspective for rapid triage.

Cloud IAM Auditing AWS · Azure · GCP
NISTCISSOC 2

Stratus Red Team

Open Source

Executes cloud attack emulation scenarios to validate detections and incident response workflows.

Cloud IAM Auditing AWS · Azure · GCP
NISTSOC 2FedRAMP

Yor

Open Source

Automatically tags IaC resources with traceability metadata to strengthen ownership and control mapping.

IaC Security AWS · Azure · GCP
SOC 2NIST

CFripper

Open Source

Static analysis for CloudFormation templates that finds risky permissions and misconfigurations pre-deploy.

IaC Security AWS
CISNISTPCI DSS

Policy Sentry

Open Source

Builds and analyzes least-privilege IAM policies using an action and resource database model.

Cloud IAM Auditing AWS
CISNISTSOC 2

IAMSpy

Open Source

Analyzes IAM permissions and trust paths to surface unintended access and escalation opportunities.

Cloud IAM Auditing AWS
CISNISTSOC 2

Contribute a Tool

Add a new entry with required fields: name, URL, category, cloud support, type, and what makes it distinct.