AWS CloudFormation enables automated, versioned, repeatable infrastructure described as code. That code can now be checked for potential security risks before it is deployed.
Using CloudSploit's plugin approach, new security checks can be added as AWS adds more resources to CloudFormation.
CloudFormation templates that are built as part of a build pipeline can now be scanned for security risks from remote build servers.
Drag-and-drop or paste a template and receive results in seconds. Each result can be clicked, displaying the affected resource.