Toggle navigation
[日本語]
Login
Toggle navigation
Vulnerability Information
Vulnerability Search
JVN Vulnerability Search
NVD Vulnerability Search
CPE検索
List of CWE
Software Information
All
Operating Systems
Web Server
Database
Other Middleware
Programming language
Framework
CMS
Encryption
Virtualization
System Management Tool
Version Update History
Support Expiration Information
Information gathering
Provide Information Site
CheatSheet
Response Header
Directory Traversal
Network related
Information about Port numbers
Protocol Information
Tools
Check Access Source Information
Generate Password
HTML Escape
HTML整形
Json整形
URL Encode・Decoding
Base64 Encode・Decoding
Numeric Character Reference Encoding・Decoding
About Secualive
Provide Information Site
Select Genre
All
media_news
security_company
tool
blog
organization
convenient_service
conference
ctf_bug_bounty
Low
framework
vulnerable_site
wordpress
proxy
tamper_detect
vulnerability_notification_site
firewall
Security Advisary
Document
Education,Training
Cloud Security Posture Management
AI
Information Site Top
->
Cloud Security Posture Management
This is a collection of sites about security.
The order is alphabetical.
Show Search Menu
URL
Name
Language
Number of items displayed
100
200
300
Add Tag
---------
News
Web Audit
Network Audit
Major
Tools
Foreign Country
Organization
Company
Celebrated Person
School
Government
Hacking
CMS
WordPress
Source Code Audit
Game Audit
Smartphone Audit
IoT Audit
Consulting
CTF
Qualifications
WAF
Education
Manipulation Detection
Endpoint Detection and Response(EDR)
Mail
Incident Response
Blog
Forensic
File Transfer
FW Audit
Pentest
E-Learning
Create Development Guidelines
Security enhancement support
Requirements Consulting
WAF Installation Support
Security Advisor
WordPress Security Enhancement
EC-CUBE Security Enhancement Support
Automatic Audit tools
System Development
Targeted Email Attack Training
Manipulation Detection
Windows
Linux/Unix
Mac OS
Open Source
Bug Bounty
SIEM
Vulnerability Management
Log Management
SOC
Hardware Audit
Android Application
Information Provision
Mail Security
Cloud Security
Database Audit
Support for PCIDSS
Building CSIRTs
Android
iOS
AWS
Open Source
Cheetsheet
Exploit
Cloud
Incorporated association
Automotive Audit
Virtual Currency Audit
Anti-tampering Audit
Smartphone App Development
Wireless LAN Audit
APT Attack Resistance Audit
Malware Audit
Building Active Directory
Secure app development environment
Website Malware Scan
Sandbox
ERP Security
Infra Security
Social engineering
MITB measures
Fraud Prediction Detection
SDK Development Kit
Countermeasures against malicious sites
FW Management
IDS/IPS Management
Active Directory Audit
Server Configuration Audit
Backup Service
DDos protection
Open Source Risk Detection
Database encryption
POS security
Blockchain Security
File Transfers
DNS security
Privacy Mark
Managed Security Service Provider (MSSP)
Managed Detection and Response (MDR)
Backups
Security Advisories
Antivirus software
Japan Corporation
Microsoft
Anti-virus software verification service
Documents
DevSecOps
OSS Security Detection
0Day Defense
RASP(Runtime Application Self Protection)
CDN
Data management and protection
Salesforce security Audit
IaaS Audit
Microsoft365 Audit
SaaS Audit
Sngle sign-on
Support for internalization of audit
Endpoint Audit
Monitoring
GDPR compliance
Cyber Security for Medical Institutions
Cyber Security Exercise
Antiphishing
ISO27001
Threat Intelligence
Law
IP address research
Fuzzing
Git
Google
Site Information Gathering
Malware and ransomware support
Server Robustness Support
AI
Vulnerability assessment Design document review
Physical Security
VOIP Audit
RedTeam
Wifi Audit
IPv6 Audit
Host Security Audit
Support for building a remote work environment
Ransomware resistance check
Wiretap and spy camera investigation
Performance survey
Support for acquisition of ISMS certification
Cyber Risk Management
Embedded Device Assessment
Insider Threat Assessment
Remote Security Assessment
Penetration Testing for Internal Attacks
AWS
AZUL
GCP
CSPM(Cloud Security Posture Management)
MISP
Internal information leakage countermeasures
System config and Management Support
Product Assessment
OSINT
1 / 1 - 合計 : 18
Cloud Security Posture Management
No
Image
Name
URL
Description
Tag
1
Check Point CloudGuard
https://www.checkpoint.com/cloudguard/
Check Point CloudGuard: Provides comprehensive cloud security posture management for multi-cloud environments, offering protection against misconfigurations, threats, and vulnerabilities while maintaining compliance.sss
Japanese
Cloud Security
2
Checkov
https://www.checkov.io/
Open-source infrastructure-as-code (IaC) security scanner for Terraform, CloudFormation, etc. Finds misconfigurations and security risks.sss
Japanese
Vulnerability Management
Cloud Security
3
CrowdStrike
https://www.crowdstrike.com/platform/cloud-security/
CrowdStrike: A cloud-native security platform that delivers advanced threat detection and protection for workloads in the cloud. It focuses on preventing breaches and securing cloud environments with endpoint detection and response (EDR).sss
Japanese
Cloud Security
4
Fugue
https://snyk.io/jp/product/
Fugue: A cloud security solution that continuously monitors infrastructure for security risks, compliance violations, and misconfigurations. It offers visibility into cloud infrastructure and automates security enforcement.sss
Japanese
Cloud Security
5
KICS
https://kics.io/index.html
Scans Terraform, Kubernetes, CloudFormation, etc. for security vulnerabilities and compliance issues.sss
Japanese
Cloud Security
6
Lacework
https://www.lacework.com/
Lacework: A cloud security platform that offers workload security, visibility, and compliance monitoring across cloud services. Lacework helps organizations identify risks, vulnerabilities, and ensure secure configurations.sss
Japanese
Cloud Security
7
Orca Security
https://orca.security/platform/cloud-security-posture-management-cspm
Orca Security: A cloud security platform that provides comprehensive protection for workloads across public cloud environments like AWS, Azure, and Google Cloud. It offers continuous visibility and automatic discovery of security risks.sss
Japanese
Cloud Security
8
PingSafe
https://jp.sentinelone.com/platform/singularity-cloud-native-security/
PingSafe: A cloud security platform that uses AI-driven threat detection and prevention to protect cloud infrastructure. It focuses on identifying security misconfigurations and vulnerabilities within the cloud environment.sss
Japanese
Cloud Security
9
SpectralOps
https://spectralops.io/
Spectral is a developer-first security tool that scans codebases, config files, and secrets to detect leaks and misconfigurations early. It integrates seamlessly into CI/CD pipelines to catch issues before deployment.sss
Japanese
Cloud Security
10
terraform
https://developer.hashicorp.com/terraform
Terraform by HashiCorp is an open-source infrastructure-as-code (IaC) software tool that enables users to define, provision, and manage cloud infrastructure using a high-level configuration language. It supports multiple cloud providers, like AWS, Azure, and Google Cloud, and allows for automation, version control, and reproducibility of infrastructure.sss
Japanese
Cloud Security
Cloud
11
Terrascan
https://runterrascan.io/
Detects compliance and security violations in Terraform code. Supports policy as code (OPA).sss
Japanese
Source Code Audit
Cloud Security
12
TFLint
https://github.com/terraform-linters/tflint
tool to find syntax errors, unused declarations, deprecated features, and more. Highly customizable with rulesets.sss
Japanese
Vulnerability Management
Cloud Security
13
tfsec
https://aquasecurity.github.io/tfsec/v1.28.13/
Security scanner focused on Terraform code. Detects insecure configurations using static analysis.sss
Japanese
Vulnerability Management
Cloud Security
Cloud
14
TrendMicro
https://www.trendmicro.com/ja_jp/business.html
A CSPM tool that helps enterprises secure their cloud environments. It focuses on identifying and remediating misconfigurations and compliance issues to ensure cloud security.sss
English
Cloud Security
15
Zluri
https://www.zluri.com/blog/cloud-security-posture-management-tools
Zluri: A SaaS management platform with integrated cloud security posture management that helps businesses manage and secure their cloud applications. Zluri offers features to monitor app usage, compliance, and security risks.sss
Japanese
Cloud Security
16
Zscaler Posture Control
https://www.zscaler.com/products-and-solutions/data-security-posture-management-dspm
Zscaler Posture Control: A solution that provides continuous monitoring and enforcement of cloud security policies, offering visibility and control to reduce risks and maintain security across cloud services.sss
Japanese
Cloud Security
17
Cloudscort
https://www.nuligen.com/service/cloudscort
Cloudscort, originally developed by New Regen Security Corporation, is a SaaS-type cloud security operation support service for web systems and other IT environments built on the cloud. Excerpted from [https://www.nuligen.com/service/cloudscort]sss
Japanese
Vulnerability Management
Cloud Security
Cloud
AWS
AZUL
GCP
CSPM(Cloud Security Posture Management)
18
cloudbase
https://cloudbase.ink/
Misconfiguration diagnostic platform in public clouds such as AWS, GCP, Azure, etc. Early detection of risks leading to serious incidents as CSPM for Japanese companies. Excerpt from [https://cloudbase.ink/]sss
Japanese
Cloud Security
AWS
AZUL
GCP
CSPM(Cloud Security Posture Management)
1 / 1 - 合計 : 18
×
Display Dashboard Setting
The selected informational sites can be displayed on the dashboard.
You can easily access them from your dashboard by selecting the sites you are interested in.
×