Skip to content

Latest commit

 

History

History
73 lines (52 loc) · 2.66 KB

course-3-important-links.md

File metadata and controls

73 lines (52 loc) · 2.66 KB

Course: Design for Security

Securing Access to Cloud Services

Securing Access to Cloud Infrastructure

Protecting Data Stored in Cloud

Defensive Security in the Cloud

Open source tools for monitoring cloud security

  • Prowler
  • Scout2
  • CloudSploit
  • Cloud Custodian

Commercial tools for monitoring cloud security

  • Fugue
  • Palo Altos
  • Prisma Cloud
  • Cloud Conformity

Tools for scanning Vulnerabilities in Cloud Workloads

Open source tools include:

  • Clair
  • Anchore
  • Trivy
  • etc.

Commercial products include:

  • aquasec
  • sysdig
  • twistlock
  • etc.

Use an SIEM(Security Event Information Monitoring) Tool

Log sources can be sent to SIEM tools for creating security dashboards. Many cloud security monitoring and SIEM tools have out of the box features to look at cloud native logs such as CloudTrail and VPC flow logs and identify anomalous activity.

Example vendor tools include:

  • Splunk
  • Sumologic,
  • Lacework
  • CloudKnox
  • etc.