orouz / cloudbeat

Beat containing opa sdk to run rego eval on cloud native resources

Repository from Github https://github.comorouz/cloudbeatRepository from Github https://github.comorouz/cloudbeat

Coverage Status Go Report Card Build status

Cloudbeat

Cloudbeat is a tool that analyzes cloud assets for security compliance and sends findings to Elasticsearch. It is designed to be used as part of the Cloud Security plugin in Kibana.

CSP Security Policies

Cloudbeat uses security policies from the Security Policies directory to evaluate cloud resources.

Getting Started

To get started with Cloud Security on your cluster, please refer to our documentation:


Deployment

To run Cloudbeat, you need to have Elastic Stack (Elasticsearch, Kibana, etc) running (locally/cloud). See our Elastic Stack Deployment options documentation.

Once your Elastic Stack is deployed, you can proceed with the deployment of Cloudbeat. For deployment instructions, see Cloudbeat Deployment options.

Development

Prerequisites

We use Hermit to manage our development tooling. Please refer to our README for detailed instructions on setting it up.


Note If you are a developer or contributor, or if you are looking for additional information, please visit our development documentation

About

Beat containing opa sdk to run rego eval on cloud native resources

License:Other


Languages

Language:Go 49.0%Language:Open Policy Agent 27.8%Language:Python 17.7%Language:Shell 3.0%Language:HCL 2.0%Language:Just 0.3%Language:Dockerfile 0.1%Language:Smarty 0.0%