CloudSploit – Cloud Security Configuration Checks

CloudSploit scans is an open-source project designed to allow detection of security risks in cloud infrastructure accounts, including: Amazon Web Services (AWS), Microsoft Azure, Google Cloud Platform (GCP), and Oracle Cloud Infrastructure (OCI). These scripts are designed to return a series of potential misconfigurations and security risks.

CloudSploit - Cloud Security Configuration Checks
CloudSploit – Cloud Security Configuration Checks

CloudSploit is available in two deployment options:

  • Self-Hosted – This is a usual servers deploy of the open-source version of CloudSploit on your machine in just a few simple steps.
  • Hosted at Aqua Cloud – CloudSploit by Aqua, hosted in the Aqua Cloud, is a fully managed service CSPM solution maintained and updated by the cloud security experts at Aqua.

CloudSploit works in two phases. First, it queries the cloud infrastructure APIs for various metadata about your account, namely the “collection” phase. Once all the necessary data is collected, the result is passed to the “scanning” phase. The scan uses the collected data to search for potential misconfigurations, risks, and other security issues, which are the resulting output.

In AWS the tool will scan for security vulnerabilities and misconfigurations that place your infrastructure at risk. These include permissive IAM roles, open security groups, expiring SSL certificates, unencrypted RDS instances, ELBs with non-compliant cipher suites, and more.

With over 50 tests, each scan covers the breadth of AWS services, producing actionable results for DevOps, security, and management teams.

Currently the tool supports AWS , Azure , GCP and Oracle cloud Infrastructure with compliance mapping for HIPAA and PCI.

You can read more and download this framework over here: https://github.com/cloudsploit/scans

Share
Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments