Enterprise-grade, open-source Cloud Security Posture Management with multi-cloud support, real-time drift detection, and comprehensive compliance mapping.
- π True Multi-Cloud: Native support for AWS, Azure, GCP, OCI, and GitHub - not just AWS wrappers
- π Real-Time Drift Detection: Instantly detect configuration changes with detailed diff analysis
- π Unified Compliance: Cross-cloud compliance with industry-standard frameworks (CIS, SOC 2, PCI-DSS, NIST)
- π― Zero-Trust Architecture: Read-only cloud access with encrypted credential storage
- π§ Extensible Design: Plugin-based rule engine with TypeScript-first development
- π± Modern UI: Beautiful, responsive React dashboard with real-time updates
- AWS: S3, IAM, EC2, RDS, CloudTrail, Config, CloudWatch
- Azure: Storage Accounts, Virtual Machines, Key Vault, Monitor, Security Center
- GCP: Cloud Storage, Compute Engine, IAM, Cloud Logging, Resource Manager
- OCI: Block Storage, Compute, Identity, Audit, Logging
- GitHub: Repositories, Organizations, Actions, Security Advisories
- ML Risk Prioritization: Predictive breach probability with weighted risk factors
- Attack Path Simulation: Graph-based lateral movement analysis with Neo4j
- Threat Intelligence Integration: Real-time CISA KEV, VulnDB, and NVD feeds
- MITRE ATT&CK Mapping: Comprehensive threat framework correlation
- Context-Aware Alerts: Industry-specific threat detection (healthcare, finance)
- Baseline Management: Set known-good configurations
- Real-Time Monitoring: Continuous configuration tracking
- Change Analysis: Detailed JSON diffs with categorization
- Alert Integration: Automated notifications for critical changes
- Historical Tracking: Complete audit trail of all modifications
- Safe Auto-Remediation: Terraform/CloudFormation code generation
- Approval Workflows: Multi-stage approval process for changes
- Rollback Capabilities: Automated rollback with validation
- IaC Integration: Seamless DevOps pipeline integration
- Cross-Cloud Connections: Discover relationships across providers
- Dependency Analysis: Resource dependency graph visualization
- Topology Export: Multiple formats (JSON, GraphML, D3.js)
- Attack Surface Mapping: Unified security posture analysis
- Security Waste Analysis: Identify overspending on security tools
- ROI Calculations: Quantify security investment returns
- Resource Optimization: Right-size security configurations
- Implementation Roadmaps: Prioritized cost-saving recommendations
- GitHub Actions: Automated security scanning workflows
- VS Code Extension: Real-time security feedback in IDE
- Slack Bot Integration: Security notifications and approvals
- Pre-Commit Hooks: Security validation before code commits
- Security Policies: Custom policy-as-code frameworks
- Container Image Scanning: Vulnerability detection with CVE databases
- Kubernetes Security: Pod security policies and network rules
- Serverless Analysis: Lambda/Functions security assessment
- Runtime Protection: Container and function runtime monitoring
- Secret Detection: Identify hardcoded secrets in images and code
- Multi-Framework Support: CIS, SOC 2, PCI-DSS, NIST, ISO27001
- Terraform Modules: Automated compliance deployment
- Evidence Collection: Automated evidence gathering for audits
- Audit Reports: Export in multiple formats (JSON, YAML, CloudFormation)
- Continuous Monitoring: Real-time compliance scoring
- Plugin Architecture: Extensible rule system with TypeScript interfaces
- Multi-Provider Rules: Provider-specific security checks
- Severity Classification: Critical, High, Medium, Low prioritization
- Evidence Collection: Automated evidence gathering for audit trails
- Custom Rules: Easy addition of organization-specific security policies
graph TB
subgraph "User Interface"
UI[React] --> API
CLI[oclif] --> API
end
subgraph "Application Layer"
API[NestJS] --> CoreEngine
API --> ComplianceEngine
API --> DriftEngine
API --> MLEngine
API --> ThreatIntel
end
subgraph "Core Engine"
CoreEngine --> RuleEngine
CoreEngine --> BaselineManager
CoreEngine --> EnhancedDriftEngine
CoreEngine --> AttackPathSim
CoreEngine --> AutoRemediation
CoreEngine --> CostOptimizer
CoreEngine --> DevSecurity
CoreEngine --> ComplianceAsCode
CoreEngine --> ContainerEngine
end
subgraph "Provider Layer"
RuleEngine --> AWS[AWS SDK]
RuleEngine --> Azure[Azure SDK]
RuleEngine --> GCP[GCP SDK]
RuleEngine --> OCI[OCI SDK]
RuleEngine --> GitHub[GitHub API]
end
subgraph "Data & Intelligence Layer"
CoreEngine --> PostgreSQL[(PostgreSQL)]
CoreEngine --> ObjectStorage[(MinIO/S3)]
MLEngine --> Neo4j[(Neo4j)]
ThreatIntel --> ThreatFeeds[(Threat Intel APIs)]
end
- Node.js 18+ and pnpm
- Docker and Docker Compose
- Cloud credentials (AWS, Azure, GCP, etc.)
git clone https://github.com/prompt-general/PathGuard.git cd PathGuard
pnpm install
pnpm docker:up
pnpm dev:api # Backend API pnpm dev:ui # Frontend UI
cd apps/cli npm run build ./bin/run scan:run --provider aws ./bin/run scan:run --provider azure ./bin/run scan:run --provider gcp
cd apps/cli npm run build ./bin/run scan:run --provider aws ./bin/run scan:run --provider azure ./bin/run scan:run --provider gcp
## π οΈ Development
### ποΈ **Monorepo Structure**
cloudsploit-like/
βββ π apps/ # User-facing applications
β βββ api/ # NestJS REST API
β βββ cli/ # oclif CLI tool
β βββ ui/ # React web dashboard
βββ π¦ packages/ # Shared libraries
β βββ core-engine/ # Core CSPM logic with advanced features
β β βββ src/engine/ # Advanced security engines
β β β βββ ml-risk-prioritizer.ts
β β β βββ attack-path-simulator.ts
β β β βββ auto-remediation.ts
β β β βββ multi-cloud-mapper.ts
β β β βββ realtime-drift-detector.ts
β β β βββ cost-security-optimizer.ts
β β β βββ developer-security.ts
β β β βββ compliance-as-code.ts
β β β βββ container-serverless-context.ts
β β β βββ threat-intelligence.ts
β β βββ src/schemas/ # Data schemas
β βββ providers/ # Cloud adapters
β β βββ aws/ # AWS provider
β β βββ azure/ # Azure provider
β β βββ gcp/ # GCP provider
β β βββ oci/ # OCI provider
β β βββ github/ # GitHub provider
β βββ rules/ # Security rules
β βββ compliance/ # Framework definitions
βββ π³ infra/ # Infrastructure as code
βββ docker-compose.yml
βββ postgresql/
βββ scripts/
### π§ **Technology Stack**
- **Language**: TypeScript (type-safe, modern)
- **Backend**: NestJS, PostgreSQL, Prisma ORM
- **Frontend**: React 18, Vite, TailwindCSS, React Query
- **CLI**: oclif, Commander.js
- **Infrastructure**: Docker, Docker Compose
- **Cloud SDKs**: AWS SDK v3, Azure SDK, GCP Cloud SDKs
- **Advanced Features**: Neo4j (graph DB), ML models, Threat Intel APIs
## π Multi-Cloud Dashboard
### π― **Unified Visibility**
- **Provider Overview**: At-a-glance status across all clouds
- **Compliance Scores**: Real-time scoring with trend analysis
- **Security Findings**: Unified view of all security issues
- **Drift Events**: Timeline of configuration changes
- **Asset Inventory**: Cross-cloud resource management
- **Risk Assessment**: Prioritized security recommendations
## π Security Features
### π‘οΈ **Zero-Trust Architecture**
- **Read-Only Access**: No destructive operations, only monitoring
- **Encrypted Storage**: All credentials encrypted at rest
- **Secure Communication**: TLS/HTTPS for all API calls
- **Audit Logging**: Complete audit trail of all actions
- **Role-Based Access**: Principle of least privilege enforcement
- **Network Isolation**: Private endpoints and VPC segmentation
## π Compliance Coverage
### π― **Industry Standards**
| Framework | Provider Coverage | Controls | Rules |
|-----------|------------------|----------|-------|
| CIS AWS | β
| 20+ | 15+ |
| SOC 2 | β
| 80+ | 60+ |
| PCI-DSS | β
| 12+ | 25+ |
| ISO 27001 | β
| 114+ | 90+ |
| NIST | β
| 200+ | 150+ |
| Cloud Security Baseline | β
| 5 | 39+ |
### π **Continuous Compliance**
- **Automated Assessments**: Schedule regular compliance scans
- **Trend Analysis**: Track compliance over time
- **Gap Remediation**: Prioritized security improvement recommendations
- **Executive Reporting**: C-level compliance summaries
- **Multi-Framework Support**: Assess against multiple standards simultaneously
## π Advanced Features
### π― **Enterprise-Ready**
- **Multi-Tenant**: Support for multiple organizations
- **Role-Based Access**: Granular permissions by team/function
- **API Rate Limiting**: Respect cloud provider limits
- **Caching**: Intelligent caching for performance
- **Scalability**: Handle enterprise-scale deployments
- **Monitoring**: Health checks and metrics collection
### π **Customization**
- **Custom Rules**: Write organization-specific security policies
- **Custom Frameworks**: Define internal compliance standards
- **Plugin Development**: Easy extension points for new capabilities
- **Webhook Integration**: Real-time notifications to external systems
- **White-Labeling**: Flexible deployment options
## π Documentation & Support
### π **Comprehensive Docs**
- **API Documentation**: Complete OpenAPI/Swagger specs
- **CLI Reference**: Detailed command documentation
- **Architecture Guides**: Deployment and configuration guides
- **Security Hardening**: Production deployment checklists
- **Troubleshooting**: Common issues and solutions
### π€ **Community & Enterprise**
- **MIT License**: Free for commercial use
- **Active Development**: Regular updates and feature releases
- **Community Support**: Discord, GitHub Discussions
- **Enterprise Support**: Commercial support and SLA options
- **Contributing Guide**: Clear development contribution process
## ποΈ Why Choose CloudSploit-like?
### π **Unlike Other Tools**
- **β Other CSPMs**: Often AWS-only or single-cloud focused
- **β Legacy Tools**: Monolithic architectures, poor extensibility
- **β Complex Setup**: Require extensive configuration and expertise
- **β Limited Compliance**: Support for few frameworks, outdated standards
### β
**CloudSploit-like Advantages**
- **π True Multi-Cloud**: Native support for all major providers from day one
- **π§ Modern Architecture**: Type-safe, extensible, maintainable codebase
- **π Unified Dashboard**: Single pane of glass for all cloud security
- **π Performance Optimized**: Efficient resource usage and fast scanning
- **π― Enterprise Features**: Built for scale, security, and compliance needs
- **π Future-Proof**: Extensible design ready for emerging cloud technologies
---
## π **Get Started Now**
```bash
# Clone and start in minutes
git clone https://github.com/your-org/cloudsploit-like.git
cd cloudsploit-like
./setup.sh && pnpm dev:api & pnpm dev:ui
π Your Multi-Cloud Security Journey Starts Here!
Built with β€οΈ for the cloud security community
Enterprise-grade security, open-source for everyone