Herramientas
Adaptamos las mejores herramientas del mercado para ofrecer soluciones personalizadas
Herramientas para soluciones personalizadas
AWS
Azure Security Services
Google Cloud Security Services
Kubernetes Security Tools
Pentesting Tools / Frameworks
DevSecOps Tools
Identity & Access Management (IAM) Tools
Cloud Security Posture Management (CSPM / CNAPP)
Secrets Management Tools
AWS Security Hub
- AWS Security Hub: Centralized security posture and compliance dashboard.
- AWS GuardDuty: Threat detection via ML and logs.
- AWS Config: Resource configuration auditing and compliance.
- AWS Inspector: Automated security assessments (EC2, Lambda, containers).
- AWS Detective: Threat investigation and relationship analysis.
Azure Security Services
- Microsoft Defender for Cloud: Unified threat protection and posture management.
- Microsoft Sentinel: SIEM + SOAR for alert correlation and response.
- Microsoft Defender for Endpoint: Endpoint detection and response.
- Azure Policy + Azure Blueprints: Governance and compliance enforcement.
- Azure Security Center: Threat management and vulnerability scanning.
Google Cloud Security Services
- Security Command Center (SCC): Centralized security and risk management platform for Google Cloud. Offers threat detection, misconfiguration analysis, and compliance monitoring.
- Cloud Armor: DDoS protection and WAF for GCP workloads.
- Chronicle Security Operations (SIEM/SOAR): Cloud-native SIEM with high-speed log analysis, incident detection, and threat hunting.
- Cloud Audit Logs: Provides logs for API activity in GCP.
- Cloud Identity & Access Management (IAM): Define and enforce fine-grained permissions for GCP resources.
Kubernetes Security Tools
- Kube-Bench: CIS compliance scanner for Kubernetes.
- Kube-Hunter: Network and configuration penetration testing.
- Falco: Runtime threat detection in containers.
- Kyverno / OPA: Policy enforcement at deployment time.
- Kubescape: Posture, compliance and RBAC analysis.
- Trivy: Vulnerability scanning for containers, IaC, and repos.
Pentesting Tools / Frameworks
- Metasploit: Exploitation framework.
- Nmap: Network scanning and discovery.
- Burp Suite: Web application security testing.
- OWASP ZAP: Open-source DAST tool.
- Nikto: Web server vulnerability scanner.
- Cobalt Strike: Adversary simulation and red teaming.
- BloodHound: Active Directory attack path mapping.
DevSecOps Tools
- Snyk: SCA for code, containers, IaC.
- Checkov: Static analysis for Terraform and other IaC.
- TFSec: Terraform security scanner.
- GitHub Advanced Security: Secret scanning, CodeQL, dependency review.
- SonarQube: Static code analysis.
- OWASP Dependency-Check: Detects vulnerable open-source libraries.
Identity & Access Management (IAM) Tools
- AWS IAM Access Analyzer: Detect publicly shared or overly permissive access.
- Azure AD PIM: Just-in-time access for privileged roles.
- Steampipe: Query IAM and cloud policies using SQL.
- CloudSploit/ <a href="Prowler :AWS-focused security auditing.
- Sonrai Security / Ermetic / Entitle.io: CIEM — Cloud Identity Entitlement Management.
Cloud Security Posture Management (CSPM / CNAPP)
- Prowler: AWS-focused security auditing.
- Wiz: Agentless cloud-native application protection platform (CNAPP).
- Lacework: Threat detection, behavior analysis, and compliance.
- Trend Micro Cloud One: Posture management, workload security.
Secrets Management Tools
- Metasploit: Exploitation framewoHashiCorp Vault: Secure storage with access policies and dynamic secrets.rk.
- AWS Secrets Manager: AWS-native secrets management with rotation.
- Azure Key Vault: Centralized key and secret storage.
Herramientas para soluciones personalizadas
AWS
Azure Security Services
Google Cloud
Security Services
Security Services
Kubernetes
Security Tools
Security Tools
Pentesting Tools
/ Frameworks
/ Frameworks
DevSecOps Tools
Identity & Access
Management (IAM) Tools
Management (IAM) Tools
Cloud Security
Posture Management
(CSPM / CNAPP)
Posture Management
(CSPM / CNAPP)
Secrets
Management Tools
Management Tools
AWS Security Hub
- AWS Security Hub: Centralized security posture and compliance dashboard.
- AWS GuardDuty: Threat detection via ML and logs.
- AWS Config: Resource configuration auditing and compliance.
- AWS Inspector: Automated security assessments (EC2, Lambda, containers).
- AWS Detective: Threat investigation and relationship analysis.
Azure Security Services
- Microsoft Defender for Cloud: Unified threat protection and posture management.
- Microsoft Sentinel: SIEM + SOAR for alert correlation and response.
- Microsoft Defender for Endpoint: Endpoint detection and response.
- Azure Policy + Azure Blueprints: Governance and compliance enforcement.
- Azure Security Center: Threat management and vulnerability scanning.
Google Cloud Security Services
- Security Command Center (SCC): Centralized security and risk management platform for Google Cloud. Offers threat detection, misconfiguration analysis, and compliance monitoring.
- Cloud Armor: DDoS protection and WAF for GCP workloads.
- Chronicle Security Operations (SIEM/SOAR): Cloud-native SIEM with high-speed log analysis, incident detection, and threat hunting.
- Cloud Audit Logs: Provides logs for API activity in GCP.
- Cloud Identity & Access Management (IAM): Define and enforce fine-grained permissions for GCP resources.
Kubernetes Security Tools
- Kube-Bench: CIS compliance scanner for Kubernetes.
- Kube-Hunter: Network and configuration penetration testing.
- Falco: Runtime threat detection in containers.
- Kyverno / OPA: Policy enforcement at deployment time.
- Kubescape: Posture, compliance and RBAC analysis.
- Trivy: Vulnerability scanning for containers, IaC, and repos.
Pentesting Tools / Frameworks
- Metasploit: Exploitation framework.
- Nmap: Network scanning and discovery.
- Burp Suite: Web application security testing.
- OWASP ZAP: Open-source DAST tool.
- Nikto: Web server vulnerability scanner.
- Cobalt Strike: Adversary simulation and red teaming.
- BloodHound: Active Directory attack path mapping.
DevSecOps Tools
- Snyk: SCA for code, containers, IaC.
- Checkov: Static analysis for Terraform and other IaC.
- TFSec: Terraform security scanner.
- GitHub Advanced Security: Secret scanning, CodeQL, dependency review.
- SonarQube: Static code analysis.
- OWASP Dependency-Check: Detects vulnerable open-source libraries.
Identity & Access Management (IAM) Tools
- AWS IAM Access Analyzer: Detect publicly shared or overly permissive access.
- Azure AD PIM: Just-in-time access for privileged roles.
- Steampipe: Query IAM and cloud policies using SQL.
- CloudSploit/ <a href="Prowler :AWS-focused security auditing.
- Sonrai Security / Ermetic / Entitle.io: CIEM — Cloud Identity Entitlement Management.
Cloud Security Posture Management (CSPM / CNAPP)
- Prowler: AWS-focused security auditing.
- Wiz: Agentless cloud-native application protection platform (CNAPP).
- Lacework: Threat detection, behavior analysis, and compliance.
- Trend Micro Cloud One: Posture management, workload security.
Secrets Management Tools
- Metasploit: Exploitation framewoHashiCorp Vault: Secure storage with access policies and dynamic secrets.rk.
- AWS Secrets Manager: AWS-native secrets management with rotation.
- Azure Key Vault: Centralized key and secret storage.