All Projects → indeni → cloudrail-demo

indeni / cloudrail-demo

Licence: BSD-3-Clause License
This repository contains the instructions for how to use Cloudrail, as well as specific scenarios to test Cloudrail with.

Programming Languages

HCL
1544 projects

Projects that are alternatives of or similar to cloudrail-demo

dad
Small configuration management tool for Clojure
Stars: ✭ 122 (+542.11%)
Mutual labels:  infrastructure-as-code
humble
Just a humble project
Stars: ✭ 53 (+178.95%)
Mutual labels:  infrastructure-as-code
poco restful webservice
A RESTful API using Poco C++ Libraries.
Stars: ✭ 54 (+184.21%)
Mutual labels:  infrastructure-as-code
ansible-unity
Ansible Modules for Dell EMC Unity
Stars: ✭ 19 (+0%)
Mutual labels:  infrastructure-as-code
POSH-HPEOneView
PowerShell language bindings library for HPE OneView.
Stars: ✭ 116 (+510.53%)
Mutual labels:  infrastructure-as-code
cdk-collections
AWS Infra as Code(akka. AWS CDK) example collections
Stars: ✭ 19 (+0%)
Mutual labels:  infrastructure-as-code
mojito-admin-starter
此项目主要为了演示如何自动化 Fullstack project 的 Infrastructure。
Stars: ✭ 17 (-10.53%)
Mutual labels:  infrastructure-as-code
azure-vdc
Automated VDC on Azure
Stars: ✭ 16 (-15.79%)
Mutual labels:  infrastructure-as-code
terrapyn
A Python module for slinging infrastructure (with terraform).
Stars: ✭ 81 (+326.32%)
Mutual labels:  infrastructure-as-code
infrastructure-pipeline
An example pipeline for executing HashiCorp Terraform with ephemeral cloud provider credentials managed by HashiCorp Vault
Stars: ✭ 44 (+131.58%)
Mutual labels:  infrastructure-as-code
aws-cdk-starter
No description or website provided.
Stars: ✭ 31 (+63.16%)
Mutual labels:  infrastructure-as-code
terraform-provider-hsdp
Terraform provider to orchestrate various HSDP resources like IAM, CDL, CDR, MDM, Container Host, Edge, etc
Stars: ✭ 26 (+36.84%)
Mutual labels:  infrastructure-as-code
terraform-vsphere-single-vm
Deploy single vSphere VM with Terraform - template.
Stars: ✭ 21 (+10.53%)
Mutual labels:  infrastructure-as-code
schema-registry-gitops
Manage Confluent Schema Registry subjects through Infrastructure as code
Stars: ✭ 36 (+89.47%)
Mutual labels:  infrastructure-as-code
curator
Config curator is CLI tool for installing static configuration files.
Stars: ✭ 29 (+52.63%)
Mutual labels:  infrastructure-as-code
molecule-demo
Molecule for Ansible Role Testing Demonstration for AnsibleFest 2017
Stars: ✭ 18 (-5.26%)
Mutual labels:  infrastructure-as-code
infracost-gh-action
GitHub Action for Infracost. Shows cloud cost estimates for Terraform in pull requests.
Stars: ✭ 119 (+526.32%)
Mutual labels:  infrastructure-as-code
epiphany
Cloud and on-premises automation for Kubernetes centered industrial grade solutions.
Stars: ✭ 114 (+500%)
Mutual labels:  infrastructure-as-code
aws-sync-routes
Synchronizes the specified route from the main/default route table to all custom route tables in the VPC.
Stars: ✭ 16 (-15.79%)
Mutual labels:  infrastructure-as-code
pico
A Git-driven task runner built to facilitate GitOps and Infrastructure-as-Code while securely passing secrets to tasks.
Stars: ✭ 51 (+168.42%)
Mutual labels:  infrastructure-as-code

Indeni Cloudrail: context-aware cloud security tool

Contents

Overview

Cloudrail is a context-aware cloud security tool that will audit your cloud environment and your IaC templates in order to build a security context of the resources being deployed to determine the security risks. The goal of Cloudrail is to be integrated within a CI/CD pipeline to catch violations of your security policy before they make it into the production environment.

Cloudrail's main advantages vs existing tools are:

  • The understanding of relationships between resources (for example, a given security group can be problematic or not, depending on how it's used)
  • Taking into account the live cloud environment, and its potential impact on the resources in the IaC code
  • Support for tfvars, runtime variables and modules (Cloudrail reviews the full plan, instead of specific .tf files)

Examples of Cloudrail-only capabilities

Features

Cloudrail currently supports Terraform files used with the AWS cloud provider.

Requirements

  • Container execution environment (such as Docker Desktop)
  • Terraform >= 0.12

How does Cloudrail work?

Cloudrail is a cloud-hosted service (SaaS) that receives a filtered version of your Terraform plan, merges it (in memory) with your cloud account's current snapshot, and runs context-aware rules on the merged model. To do this, the Cloudrail CLI container will receive your Terraform plan, reduce it to a minimal version we need for analysis (what we call "Terraform context"), and then upload that minimal version to our service.

This ensures no highly-sensitive content from the plan ever leaves your network.

Usage

1. Sign up and download container

Go to https://web.cloudrail.app to sign up for Cloudrail. This will include adding your cloud account, and will provide instructions for downloading and using the Cloudrail CLI container.

2. Execute Terraform examples

Inside the "test" folder you will find several examples you can use to try Cloudrail with. Some of these examples will set up vulnerable resources that are detected by Cloudrail as such. A few of these examples are not vulnerable, and are there to show Cloudrail's context awareness.

3. Try your own scenarios

Now it's time for you to try Cloudrail with your own scenarios. Simply follow the same process - "terraform init", "terraform plan -out=plan.out" and "cloudrail run".

Troubleshooting

If you encounter any error, please let us know in the Indeni Slack channel #cloudrail-user-support. An invite can be received by filling out the form here: https://indeni.com/cloudrail-user-support/

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].