Safe & Secure
CloudSploit scans require read-only permissions to your account with secure cross-account roles.
Adhering to security best practices can be difficult and time consuming, especially in large environments.
Auditing AWS account security can consume hours of developer time each week. CloudSploit automates the detection of risks on a continuous basis.
The scan reports generated by CloudSploit can be used to quickly assess risk, plan for remediation, and audit changes over time. Legal's happy. You're happy.
Misconfigurations put your customers' data and your business at risk. Look what happened to CodeSpaces. CloudSploit detects these risks before they are exploited.
Many attackers who gain access to an AWS account embed themselves in unused regions to avoid detection. CloudSploit scans every public AWS region, even the ones you don't actively use.
A security tool isn't much good if it doesn't help fix the problems it finds. Every CloudSploit scan report includes in-depth remediation steps. Don't just detect risks; fix them and continually reassess.
There are no limits on the number of active CloudSploit users and connected AWS accounts - even in our Free Plan. Collaborate with your team, share scan reports, and protect all of your AWS infrastructure.
Access all of CloudSploit's tools and functionality via API. Connect with CI/CD environments, custom scripts, and more. Read More »
See how CloudSploit complements existing AWS security solutions here.
No agents to run; setup in minutes.
Cross-account IAM roles allow CloudSploit to query the AWS API on behalf of your account.
CloudSploit never requires write access to your account. Simply use the built-in AWS Security Audit policy.
It takes less than a minute to connect a new role through the CloudSploit dashboard.
You can initiate on-demand scans immediately or enable continuous, background scanning.
For more details and to see a complete comparison chart, click here.
Setup in minutes with nothing to install and no infrastructure to manage.
CloudSploit can run entirely in your browser and output results for download.
Receive email summaries with risk counts and new discoveries for every scan.
Quickly detect issues and severity with CloudSploit's global region hotmap of detected risks.
Add as many users as you need to share results, reports and scan details. Even in our free plans.
Export formatted reports as CSV for safe-keeping, auditing, and sharing.
Write your own private tests and checks specific to your environment for even more customized results.
Easily suppress false positives, unused resources, specific checks, or entire regions.
Search for specific resources, tests, or keywords across all accounts and reports.
Scan results can be stored for up to six months for historical analysis and auditing.
Setup custom Slack, Email, and SNS alerts for specific tests and results.
CloudSploit tools highlight expiring SSL certificates, at-risk IAM users, and more.
Take a look at more screenshots of the product here.
Our modern, open source scanning engine is fully auditable and open for community contributions.
CloudSploit scans require read-only permissions to your account with secure cross-account roles.
The CloudSploit plugin database is continually updated with the latest AWS services.
CloudSploit scans make the fewest API calls necessary to make an accurate prediction of security.
Save hundreds of developer-hours with our low-cost plans.
Free
$ 0
/month/aws account
Basic
$ 717
*when paid annually
or $8 paid monthly
Plus
$ 3600
*when paid annually
or $40 paid monthly
Premium
$ 9900
*when paid annually
or $110 paid monthly
Read more about our plans and pricing here.
Our support team can answer any other questions that our help page can't.
Absolutely. CloudSploit only needs read-only access to your resources, never stores account information for on-demand scans, and supports secure cross-account IAM roles for access. For more information about our security efforts, click here.
No. CloudSploit's scans are passive consumers of AWS API responses and do not modify or delete an account's contents in any way. Regardless, the cross-account IAM role you create for CloudSploit should only use read-only permissions.
CloudSploit has multiple plugins for almost all AWS services that require security checks: CloudTrail, Config Service, EC2, ELB, IAM, KMS, RDS, Route53, S3, and VPC. Additional checks are constantly being added as AWS releases more services.
Our entire scanning engine, which is responsible for querying the AWS APIs and interpreting the responses, is open-source. Additionally, all of the individual plugins for various AWS services are open-source as well. You can view both on GitHub.
Sign up and begin scanning for free within minutes. No obligation.