🔐
DevSec
💻 GitHub
  • 👋Welcome
    • DevSec
    • Glossary
    • Contributing
    • Discussions
  • 📖Resources
    • Articles
    • Books
    • Communities
    • Institutions
    • Conferences
    • Sites
    • Podcasts
    • Training
    • Other
  • ⚒️Tools
    • Static Analysis
    • Dynamic Analysis
    • Vulnerabilities Analysis
    • Dependency Management
    • Supply Chain
    • Secrets
      • Secrets Management
      • Secrets Scanning
    • Infrastructure as Code (IaC)
    • Other
  • 🔧Generic Development
    • Security Basics
    • Containers
    • Git & other VCS
    • Cryptography
  • ☁️Web Development
    • Generic
    • APIs
  • ☁️Cloud
    • Cloud native
    • Kubernetes
  • 😈On the other side
    • Red team
Powered by GitBook
On this page
  • About
  • Best practices
  • Resources
  • Governance
  • Standards
  • Tools
  • Reading
  • Podcasts
  • Testing & Learning
  • Others
  • Sources

Was this helpful?

Edit on GitHub
  1. Cloud

Cloud native

Be careful with your cloud ☁️

PreviousAPIsNextKubernetes

Last updated 1 year ago

Was this helpful?

About

Cloud-native security refers to a set of security practices and technologies designed specifically for applications built and deployed in cloud environments. It involves a shift in mindset from traditional security approaches, which often rely on network-based protections, to a more application-focused approach that emphasizes identity and access management, container security and workload security, and continuous monitoring and response.

In a cloud-native security approach, security is built into the application and infrastructure from the ground up, rather than added on as an afterthought. This requires a combination of automated security controls, DevOps processes, and skilled security professionals who can manage the complex and dynamic nature of cloud environments. The goal of cloud native-security is to protect against threats and vulnerabilities that are unique to cloud environments, while also ensuring compliance with regulations and standards. [1]

Best practices

From [2] (CNAS, by order), try to avoid:

Resources

Find here a complete list of resources related to cloud security.

Governance

AWS Governance

MultiCloud Governance

Standards

Compliances

Benchmarks

Tools

Infrastructure

Container

SaaS

Native tools

  • AWS:

  • Azure:

  • GCP:

Incident Response

Examples

  • Ex. Automated Security Assessment

  • Ex. Identity and Access Management

  • Ex. Logging

  • Ex. Web Application Firewall

Others

Reading

  • AWS:

  • Azure:

  • GCP:

  • Others:

Podcasts

Testing & Learning

  • Labs:

  • Courses:

  • Others:

Others

Sources

: A collection of AWS penetration testing junk

: Python installable command line utility for mitigation of instance and key compromises.

: Deploy, update, and stage your WAFs while managing them centrally via FMS.

: A vault for securely storing and accessing AWS credentials in development environments.

: A graph-based tool for visualizing effective access and resource relationships within AWS.

: A security auditing tool for Azure environments

: A static code analysis tool for infrastructure-as-code.

: A python lib for DF & IR on the cloud.

: Automate the execution of simulation steps in multi-cloud and hybrid cloud environments.

: Listing Assets from multiple Cloud Providers.

: A platform designed to manage Cloud Security Operations.

: Analyze your AWS environments.

: A cloud monitoring tool and framework.

: Cloud security configuration checks.

: Open source cloud asset inventory with set of pre-baked SQL for security and compliance.

: Rules engine for cloud security, cost optimization, and governance.

: A Central Control Plane for AWS Permissions and Access

: Tool for auditing the security posture of AWS/GCP/Azure.

: Apache v2, powerful runtime vulnerability scanner for kubernetes, virtual machines and serverless.

: A multi-cloud framework for orchestrating forensic collection, processing and data export.

: Diffy is a digital forensics and incident response (DFIR) tool developed by Netflix.

: Continuously monitor AWS services for configurations.

: GCP inventory monitoring and policy enforcement tool.

: A multi-account cloud security tool for AWS. It identifies misconfigurations and insecure data exposures within most popular AWS resources.

: Find security vulnerabilities, compliance issues, and infrastructure misconfigurations early in the development cycle of your infrastructure-as-code.

: Open source serverless security lake platform on AWS that lets you ingest, store, and analyze data into an Apache Iceberg data lake and run realtime Python detections as code.

: Prevent SSRF attacks on AWS EC2 via automated upgrades to the more secure Instance Metadata Service v2 (IMDSv2).

: Policy-based control tool.

: Policy as Code Bot.

: The AWS exploitation framework.

: Command line tool for AWS Security Best Practices Assessment, Auditing, Hardening and Forensics Readiness Tool.

: Multi-cloud security auditing tool.

: Monitors AWS, GCP, OpenStack, and GitHub orgs for assets and their changes over time.

: Tool helps to discover suspicious creation forms and uses of temporary tokens in AWS.

: Find cloud assets that no one wants exposed.

: A Postgres FDW that maps APIs to SQL, plus suites of and for AWS/Azure/GCP and many others.

: Detect compliance and security violations across Infrastructure as Code to mitigate risk before provisioning cloud native infrastructure.

: Static analysis powered security scanner for Terraform code.

: AWS Auditing & Hardening Tool.

(⚠️): Open source demos, concept and guidance related to the AWS CIS Foundation framework.

(⚠️): tools for managing AWS resources including EC2, EBS, RDS, IAM, CloudFormation and Route53.

: Audit for for EKS, AKS and GKE for HIPAA/PCI/SOC2 compliance and cloud security.

: Container runtime security.

: Managed kubernetes inspection tool.

: Policy-based control tool.

: A vulnerability scanner for container images and filesystems.

: KAI (Kubernetes Automated Inventory) can poll Kubernetes Cluster API(s) to tell Anchore which Images are currently in-use.

: CLI tool and library for generating a Software Bill of Materials from container images and filesystems.

: Cloud Security Posture Management (CSPM).

: Checks whether Kubernetes is deployed according to security best practices as defined in the CIS Kubernetes Benchmark.

: Hunt for security weaknesses in Kubernetes clusters.

: Show who has RBAC permissions to perform actions on different resources in Kubernetes.

: Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more.

: The Docker Bench for Security is a script that checks for dozens of common best-practices around deploying Docker containers in production.

: a tool to perform static analysis of known vulnerabilities, trojans, viruses, malware & other malicious threats in docker images/containers and to monitor the docker daemon and running docker containers for detecting anomalous activities.

: Cloud Native Runtime Security.

: An open source trusted cloud native registry project that stores, signs, and scans content.

: Vulnerability Static Analysis for Containers.

: Snyk CLI scans and monitors your projects for security vulnerabilities.

: A Blazing fast Security Auditing tool for Kubernetes.

: Automatically compile an AWS Service Control Policy with your preferred compliance frameworks.

: Serverless S3 yara scanner.

: An AWS IAM Security Assessment tool that identifies violations of least privilege and generates a risk-prioritized report.

: Rapidly cherry-pick cloud security guardrails by generating Terraform files that create Azure Policy Initiatives.

: Protection/destection lib of aws lambda and gcp function.

: S3 bucket finder and content discover.

: A script to enumerate Google Storage buckets.

: Detects identity and access management issues and automatically suggests least-privilege policies.

: AWS Lambda auditing tool.

: IAM Least Privilege Policy Generator.

: Tool to check AWS S3 bucket permissions.

: A serverless application demonstrating common serverless security flaws.

: Tool to helps to discover, assess and secure the most privileged entities in Azure and AWS.

(⚠️): Terraform provider for Policy Sentry (IAM least privilege generator and auditor).

: Aardvark is a multi-account AWS IAM Access Advisor API.

: Parse and Process AWS IAM Policies, Statements, ARNs, and wildcards.

(⚠️): AWS Least Privilege for Distributed, High-Velocity Deployment.

(⚠️): Generate Multi-Account IAM users/groups/roles/policies from a simple YAML configuration file and Jinja2 templates.

: AWS IAM linting library.

(⚠️): CloudTracker helps you find over-privileged IAM users and roles by comparing CloudTrail logs with current IAM policies.

: Compliance report selfservice.

: Continuously audit for AWS usage.

: Private CA and certificate management service.

: Record and log API call on AWS.

: Configuration and resources relationship monitoring.

: Application recovery service.

: Analyze and visualize security data and help security investigations.

: Firewall management service.

: IDS service

: HSM service.

: Vulnerability discover and assessment service.

: KMS service

: Fully managed data security and data privacy service for S3.

: Network firewall service.

: Credential management service.

: Integration service for other AWS and third-party security service.

: DDoS protection service.

: Service of centrally manage access AWS or application.

: Identify vulnerabilities in running containers, images, hosts and repositories.

: Log of network traffic.

: Web application firewall service.

: L7 load balancer with optional WAF function.

: DDoS protection service.

: HSM service.

: KMS service

: API log and monitoring related service.

: Integration service for other Azure and third-party security service.

: SIEM service.

: Transparency log and control of GCP.

: API security monitoring, detection, mitigation.

: DDoS protection and WAF service

: Asset monitoring service.

: Secure and compliant workloads.

: API logs.

: Binary authorization service for containers and serverless.

: HSM service.

: IDS service.

: Encrypt data in use with VM.

: Enable zero trust access to applications and infrastructure.

: DLP service:

: External key management service

: Identity-Aware Proxy for protect the internal service.

: KMS service

: Detect the policy related risk.

: Integration service for other GCP security service.

: Application security scanner for GAE, GCE, GKE.

: VM with secure boot and vTPM.

: Threat dection service.

: GCP service security perimeter control.

: A centralized source of all AWS IAM privilege escalation methods.

: Library of all the attack scenarios on Amazon S3, and how to mitigate them following a risk-based approach

: A collection of scripts for assessing Microsoft Azure security

: A collection of scripts for assessing Microsoft Azure security

Learning Paths (by ):

: Cloud Container Attack Tool.

: A multiple cloud enumerator.

: "Vulnerable by Design" AWS deployment tool.

: A framework for executing attacker actions in the cloud.

: Tool for spinning up insecure AWS infrastructure with Terraform.

: Bridgecrew's "Vulnerable by Design" Terraform repository.

: A vulnerable app which demonstrates how to not use secrets. With AWS/Azure/GCP support.

: 900+ documented cloud security risks, with ability to filter by cloud vendor, compliance framework, risk category, and criticality.

AWS

[1]:

[2]:

[3]:

[4]:

[5]:

☁️
OWASP Cloud-Native Application Security Top 10
AWS CloudFormation Guard
AWS CodePipeline Governance
AWS Config Rules Development Kit
AWS Control Tower Customizations
AWS Security Hub Automated Response and Remediation
AWS Vault
AWS Well Architected Labs
Cloud Custodian
CloudQuary
Cloudsploit
ManageIQ by RedHat
Mist.io
NeuVector
Triton by Joyent
CSA STAR
ISO/IEC 27017:2015
ISO/IEC 27018:2019
MTCS SS 584
CCM
NIST 800-53
CIS Benchmark
aws_pwn
aws_ir
aws-firewall-factory
aws-vault
awspx
azucar
checkov
cloud-forensics-utils
Cloud-Katana
cloudlist
Cloud Sniper
Cloudmapper
Cloudmarker
Cloudsploit
CloudQuery
policies
Cloud-custodian
consoleme
cs suite
Deepfence ThreatMapper
dftimewolf
diffy
ElectricEye
Forseti security
Hammer
kics
Matano
Metabadger
Open policy agent
pacbot
pacu
Prowler
ScoutSuite
Security Monkey
SkyWrapper
Smogcloud
Steampipe
API plugins
compliance mods
Terrascan
tfsec
Zeus
AWS Security Benchmark
AWS Missing Tools by CloudAvail
auditkube
Falco
mkit
Open policy agent
Grype
Kai
Syft
Cloudsploit
Kube-Bench
Kube-Hunter
Kubectl-who-can
Trivy
Docker - Docker Bench for Security
Elias - Dagda
Falco Security - Falco
Harbor - Harbor
Quay - Clair
Snyk - Snyk
vchinnipilli - Kubestriker
aws-allowlister
binaryalert
cloudsplaining
Cloud Guardrails
Function Shield
FestIN
GCPBucketBrute
IAM Zero
Lambda Guard
Policy Sentry
S3 Inspector
Serverless Goat
SkyArk
Terraform for Policy Guru
Aardvark
PolicyUniverse
Repokid
AWS IAM Generator
Parliament
CloudTracker
Artifact
Audit manager
Certificate Manager
CloudTrail
Config
Elastic Disaster Recovery
Detective
Firewall Manager
GuardDuty
CloudHSM
Inspector
KMS
Macie
Network Firewall
Secret Manager
Security Hub
Shield
Single Sign-On
ThreatMapper
VPC Flowlog
WAF
Application Gateway
DDoS Protection
Dedicated HSM
Key Vault
Monitor
Security Center
Sentinel
Access Transparency
Apigee Sense
Armor
Asset Inventory
Assured workloads
Audit Logs
Binanry Authorization
Cloud HSM
Cloud IDS
Confidential VM
Context-aware Access
DLP
EKM
Identity-Aware Proxy
KMS
Policy Intelligence
Security Command Center
Security Scanner
Shielded VM
Event Threat Detection
VPC Service Controls
AWS Incident Response Playbooks by AWS Samples
AWS Security Hub Automated Response and Remediation
Dispatch by Netflix
PagerDuty Automated Remediation Docs
PagerDuty Business Response Docs
PagerDuty DevSecOps Docs
PagerDuty Full Case Ownership Docs
PagerDuty Full Service Ownership Docs
PagerDuty Going OnCall Docs
PagerDuty Incident Response Docs
PagerDuty Operational Review Docs
PagerDuty PostMortem Docs
PagerDuty Retrospectives Docs
PagerDuty Stakeholder Communication Docs
Velociraptor
AWS Config Rules Repository
AWS Inspector Agent Autodeploy
AWS Inspector Auto Remediation
AWS Inspector Lambda Finding Processor
Amazon Cognito Streams connector for Amazon Redshift
AWS Centralized Logging
AWS Config Snapshots to ElasticSearch
AWS CloudWatch Events Monitor Security Groups
AWS WAF Sample
AWS WAF Security Automations
Git Secrets by AWS Labs
411 by Etsy
ElastAlert by Yelp
StreamAlert by Airbnb
Knox
Spring Cloud Security
ThreatModel for Amazon S3
Overiew of AWS Security
AWS-IAM-Privilege-Escalation by RhinoSecurityLabs
MITRE ATT&CK Matrices of AWS
AWS security workshops
ThreatModel for Amazon S3
Overiew of Azure Security
Azure security fundamentals
MicroBurst by NetSPI
MITRE ATT&CK Matrices of Azure
Azure security center workflow automation
Overiew of Azure Security
Azure security fundamentals
MicroBurst by NetSPI
MITRE ATT&CK Matrices of Azure
Azure security center workflow automation
Cloud recent news | Dark Reading
Azure DevOps Podcast
Security Now
AWS Workshops
AWS Identity: Using Amazon Cognito for serverless consumer apps
AWS Network Firewall Workshop
AWS Networking Workshop
Access Delegation
Amazon VPC Endpoint Workshop
Build a Vulnerability Management Program Using AWS for AWS
Data Discovery and Classification with Amazon Macie
Data Protection
DevSecOps - Integrating security into your pipeline
Disaster Recovery on AWS
Finding and addressing Network Misconfigurations on AWS
Firewall Manager Service - WAF Policy
Getting Hands on with Amazon GuardDuty
Hands on Network Firewall Workshop
Implementing DDoS Resiliency
Infrastructure Identity on AWS
Integrating security into your container pipeline
Integration, Prioritization, and Response with AWS Security Hub
Introduction to WAF
Permission boundaries: how to delegate permissions on AWS
Protecting workloads on AWS from the instance to the edge
Scaling threat detection and response on AWS
Serverless Identity
PagerDuty Training Lab
PagerDuty Training GitHub
PagerDuty Training for Engineers
PagerDuty Training for Everyone: Part 1
PagerDuty Training for Everyone: Part 2
Oracle Cloud Security Administrator
A Cloud Guru
AWS Security Path
Azure Security Path
GCP Security Path
ccat
CloudBrute
cloudgoat
Leonidas
Sadcloud
TerraGoat
WrongSecrets
ServerlessGoat by OWASP
Cloud Security Research by RhinoSecurityLabs
CSA cloud security guidance v4
Appsecco provides training
Cloud Risk Encyclopedia by Orca Security
Mapping of On-Premises Security Controls vs. Major Cloud Providers Services
Bucket search by grayhatwarfare
What Is Cloud-Native Security? - Palo Alto Networks
OWASP Cloud-Native Application Security Top 10 | OWASP Foundation
4ndersonLin/awesome-cloud-security: 🛡️ Awesome Cloud Security Resources ⚔️ (github.com)
Funkmyster/awesome-cloud-security: Curated list of awesome cloud security blogs, podcasts, standards, projects, and examples. (github.com)
teamssix/awesome-cloud-security: awesome cloud security 收集一些国内外不错的云安全资源,该项目主要面向国内的安全人员 (github.com)