Cloud Security Tool Directory
Browse high-signal tools mapped to real cloud security operations. Filter by domain, cloud, type, and compliance standards to find what fits your stack fast.
Find your fit
60 tools shown
Prowler
Open SourceLarge benchmark coverage with pragmatic cloud misconfiguration checks.
Wiz
CommercialGraph-based cloud attack path visibility across workloads and identities.
Prisma Cloud
CommercialBroad CNAPP suite spanning code, runtime, and cloud posture domains.
Checkov
Open SourcePolicy-as-code scanning for Terraform, Kubernetes, and CloudFormation.
tfsec
Open SourceFast local Terraform static analysis with clear remediation output.
Snyk IaC
FreemiumDeveloper-first IaC checks tightly integrated into pull request flow.
TruffleHog
Open SourceHigh-signal secret discovery with verified credential checks.
Gitleaks
Open SourceSimple, fast, and CI-friendly scanner for leaked credentials.
Aqua Trivy
Open SourceSingle CLI for image, filesystem, and IaC vulnerability checks.
Falco
Open SourceRuntime threat detection for containers and Kubernetes workloads.
Open Policy Agent
Open SourceGeneral-purpose policy engine used from CI to admission control.
Cloud Custodian
Open SourcePolicy-driven cloud resource governance and automated remediation.
Syft
Open SourceDeveloper-friendly SBOM generator with broad package ecosystem support.
Grype
Open SourceVulnerability scanner designed to pair directly with generated SBOMs.
Permiso
CommercialIdentity-centric detection focused on cloud service account abuse.
PMapper
Open SourcePrivilege escalation path analysis for AWS IAM role relationships.
Scout Suite
Open SourceMulti-cloud security audit with visualized findings and drill-down.
Steampipe
Open SourceQuery cloud APIs with SQL for rapid compliance checks and dashboards.
CloudMapper
Open SourceVisualizes AWS account relationships and attack paths for security review.
aws-nuke
Open SourceAutomates safe teardown of AWS resources to enforce clean account baselines.
Pacu
Open SourceAWS exploitation framework for testing IAM abuse paths and cloud misconfigurations.
Security Monkey
Open SourceMonitors cloud account changes and flags policy and configuration drift.
CloudGoat
Open SourcePurpose-built AWS scenarios for validating detection and IAM attack-path readiness.
Cloudsplaining
Open SourceIdentifies risky IAM permissions and privilege-escalation patterns in AWS policies.
Terragoat
Open SourceDeliberately vulnerable Terraform stack for testing IaC misconfiguration detection.
Parliament
Open SourceLints IAM policies to catch privilege, wildcard, and risky permission issues early.
CloudTracker
Open SourceCompares CloudTrail activity to granted IAM permissions to spot over-privileged identities.
SkyArk
Open SourceFinds and assesses highly privileged AWS entities that increase account takeover risk.
CloudSploit Scans
Open SourceLarge set of AWS security checks for identifying cloud misconfigurations at scale.
AWS Inventory
Open SourceBuilds comprehensive cross-region AWS asset inventories for exposure and drift analysis.
Cartography
Open SourceGraphs cloud assets and trust relationships to uncover risky access paths.
CloudQuery
Open SourceExtracts cloud configuration data into SQL tables for policy checks and reporting.
cdk-nag
Open SourceApplies security and compliance rules to AWS CDK constructs during development.
kube-bench
Open SourceRuns CIS Kubernetes benchmark checks against cluster nodes and control planes.
kube-hunter
Open SourcePerforms active reconnaissance to identify exposed Kubernetes security weaknesses.
Kubescape
Open SourceKubernetes posture scanner with framework mappings and risk prioritization guidance.
Peirates
Open SourceSimulates common Kubernetes-to-cloud privilege escalation paths in AWS environments.
GitGuardian ggshield
FreemiumDeveloper-friendly secret detection in commits and CI pipelines with strong accuracy.
Orca Security
CommercialAgentless CNAPP platform focused on broad cloud asset and risk visibility.
Lacework
CommercialBehavior-based CNAPP detection across cloud, containers, and identities.
Sysdig Secure
CommercialCombines cloud posture, runtime threat detection, and container vulnerability controls.
Tenable Cloud Security
CommercialCNAPP offering with strong posture analytics and entitlement risk visibility.
KICS
Open SourceStatic analysis engine for Terraform, Kubernetes, and other IaC formats.
Terrascan
Open SourcePolicy-based IaC scanner with broad cloud provider and framework coverage.
cfn-nag
Open SourceLints CloudFormation templates to detect risky security configurations before deploy.
Trivy Operator
Open SourceBrings continuous vulnerability and configuration scanning into Kubernetes clusters.
Kyverno
Open SourceKubernetes-native policy engine for enforceable guardrails and admission controls.
Kubewarden
Open SourceAdmission policy framework using WebAssembly for portable Kubernetes enforcement.
detect-secrets
Open SourcePre-commit focused secret scanner with baseline workflows for noisy repositories.
shhgit
Open SourceReal-time GitHub secret monitoring to quickly surface exposed credentials.
Automated Security Helper (ASH)
Open SourceRuns multiple code and IaC security scanners in isolated containers with one aggregated security report.
Cloud-Nuke
Open SourceDeletes cloud resources at scale to enforce clean account baselines and reduce stale attack surface.
iam-floyd
Open SourceGenerates AWS IAM policies programmatically with a fluent interface to reduce policy authoring mistakes.
cloudfox
Open SourceEnumerates cloud attack paths and identity exposure from an attacker perspective for rapid triage.
Stratus Red Team
Open SourceExecutes cloud attack emulation scenarios to validate detections and incident response workflows.
CloudFormation Guard
Open SourcePolicy-as-code validation for CloudFormation templates to block insecure infrastructure before deployment.
Yor
Open SourceAutomatically tags IaC resources with traceability metadata to strengthen ownership and control mapping.
CFripper
Open SourceStatic analysis for CloudFormation templates that finds risky permissions and misconfigurations pre-deploy.
Policy Sentry
Open SourceBuilds and analyzes least-privilege IAM policies using an action and resource database model.
IAMSpy
Open SourceAnalyzes IAM permissions and trust paths to surface unintended access and escalation opportunities.
No tools match your current filters.
Contribute a Tool
Add a new entry with required fields: name, URL, category, cloud support, type, and what makes it distinct.