- CyberArk
- thycotic
- AWS documentation for setting up an instance profile role
- Security best practices for your VPC
- OpenVPN on AWS
- Dynamo DB Client-Side and Server-Side Encryption guide
- S3 Client-Side and Server-Side Encryption Guide
- Detailed White Paper on KMS Best Practices
- Prowler
- Scout2
- CloudSploit
- Cloud Custodian
- Fugue
- Palo Altos
- Prisma Cloud
- Cloud Conformity
Open source tools include:
- Clair
- Anchore
- Trivy
- etc.
Commercial products include:
- aquasec
- sysdig
- twistlock
- etc.
Log sources can be sent to SIEM tools for creating security dashboards. Many cloud security monitoring and SIEM tools have out of the box features to look at cloud native logs such as CloudTrail and VPC flow logs and identify anomalous activity.
Example vendor tools include:
- Splunk
- Sumologic,
- Lacework
- CloudKnox
- etc.