CloudGraph cli
cartography
Our great sponsors
CloudGraph cli | cartography | |
---|---|---|
24 | 11 | |
869 | 2,869 | |
0.6% | 1.0% | |
1.3 | 7.9 | |
6 months ago | 4 days ago | |
TypeScript | Python | |
Mozilla Public License 2.0 | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
CloudGraph cli
- Using cloudgragh in projects
-
Resoto: An open-source alternative to AWS Systems Manager Inventory
Looks similar to https://github.com/cloudgraphdev/cli
-
What’s your experience with AWS Cloud Control API
Honestly, half baked and not very useful at all. If you want an actual single GraphQL based API for ALL of your AWS services, plus CSPM (CIS 1.2, 1.3, 1.4, PCI, and NIST) check out https://github.com/cloudgraphdev/cli. Completely free OSS
-
Interesting tools?
https://github.com/cloudgraphdev/cli the GraphQL API for K8s, AWS, GCP, and Azure
-
Ask HN: Tool to export AWS configuration entirely?
Check out https://github.com/cloudgraphdev/cli. It supports a vast majority of AWS services and creates a type-safe GraphQL definition of your entire account
-
Finding things
If you are looking for a type-safe asset inventory of your GCP footprint(s) you can check out https://github.com/cloudgraphdev/cli. Along with the asset inventory (which you can query via GraphQL) it will also check for CIS 1.2 compliance failures.
-
Need to extract full inventory from Google Cloud in a useable format
CloudGraph can give you a type-safe asset inventory (plus CIS 1.2 compliance checks) for all of your resources on GCP: https://github.com/cloudgraphdev/cli
-
General AWS Stack Security
Some great suggestions here. I would also suggest running some tool like: https://github.com/cloudgraphdev/cli with the AWS CIS policy pack so you can ensure you are following best practices.
-
List EC2 instances from all accounts in all regions
You can use a tool like [CloudGraph](https://github.com/cloudgraphdev/cli) to do this pretty easily.
- I built an open-source GraphQL API for AWS, Azure, GCP, and Kubernetes in TypeScript
cartography
-
Any AWS networking visualization tool?
Cartography (Python application) will get you part of the way there, in that it will discover the state of the environment, record node information and relationships in a graph database, and can be easily extended. You can also then easily write queries about the relationships of various resources to answer questions like “what can I reach from VPC X”. Drawing diagrams though is very hard to do well without extra input.
-
ZeusCloud - Open-source Cloud Security built on Neo4j
Build an asset inventory of the cloud environment. (using an OSS project called cartography)
-
ZeusCloud: An open source cloud security platform
The project is still early, so we’d love your feedback! We’ve based our cloud asset inventory on another great OSS project called cartography. So far, we’ve added misconfiguration checks and common identity-based attack paths. Up next on our roadmap are network/access graph visualizations, vulnerability scanning, and secret scanning!
- Graph Databases
- Open Source tool that dumps infrastructure data into a graph database to query
-
Starting your Cloud Security Journey
The first step involved in threat modelling is to build an architecture diagram of the system you are protecting. This also involves building a list of assets in the system. You cannot protect something which you don’t have visibility over. We can use tools such as CloudMapper from the previous step for building an architecture diagram of an AWS cloud environment. There are similar tools for threat modeling for other cloud service providers like Cartography.
- I built an open-source GraphQL powered search engine for your AWS infrastructure.
-
Identify AWS Security Groups attached to public resources
Lyft made a tool called Cartography, which scrapes your AWS Account(s) and inserts representations of many of your cloud resources into a Neo4j (graph) database. This makes it easy to query and discover how things are connected in your account.
-
My Experience Contributing To The Cartography Open Source Project
Recently, we at Cloudanix made open source contributions to the Cartography project by Lyft. We contributed to the pre-existing AWS module by adding support for KMS and API gateway. Since the Cartography project did not have support for Microsoft Azure, we started from scratch to add that capability to Cartography. We added support for Azure services like CosmosDB, SQL, Storage, and Virtual Machines.
-
How to 10X Your Company’s Security (Without a Series D)
[2] https://github.com/lyft/cartography
What are some alternatives?
aws-nuke - Nuke a whole AWS account and delete all its resources.
cloudquery - The open source high performance ELT framework powered by Apache Arrow
fixinventory - Fix Inventory consolidates user, resource, and configuration data from your cloud environments into a unified, graph-based asset inventory.
ScoutSuite - Multi-Cloud Security Auditing Tool
pulumi-kubernetesx - Kubernetes for Everyone
libretaxi - Open source Uber #deleteuber
awesome-kubernetes - A curated list of awesome references collected since 2018.
clutch - Extensible platform for infrastructure management
cloud-security-list - A list of cloud security tools and vendors.
Scout2 - Security auditing tool for AWS environments
cnquery - open source, cloud-native, graph-based asset inventory
Keycloak - Open Source Identity and Access Management For Modern Applications and Services