
Log4JShell ByteCode Detector
A remote code execution vulnerability has been recently discovered in the popular Java logging framework Log4j …
Connect CodeShield to your AWS account(s)
and start scanning. No need to install further tools or runtime agents.
CodeShield builds a complete graph of your AWS cloud and combines all findings from AWS Config, Inspector, etc. into a single graph – giving you the big picture.
CodeShield shows how attackers can combine multiple weaknesses and IAM privileges to move forward in your cloud.
What People Say
1-click graph view
CodeShield correlates vulnerabilities and misconfigurations into one single graph. This helps identify IAM privilege escalation vulernabilities and attack paths, that attackers can use to exploit your cloud.
While misconfigurations, vulnerabilities, or over-permissioned IAM policies can be dangerous on their own, successful attacks are built on combinations of multiple weaknesses. CodeShield reveals hidden connections, and checks if there are dangerous IAM policies that allow an attacker to further move or pivot inside your cloud.
Seamless Integration
CodeShield automatically integrates findings from AWS Config, Amazon Inspector, and IAM Access Analyzer for computing attack paths and their impact on your cloud.
So you can achieve a full coverage of your AWS cloud, including serverless functions, databases and buckets, EC2 instances and ECS docker containers, network configurations and security groups, API gateways, IAM policies, and many more.
Recent posts
A remote code execution vulnerability has been recently discovered in the popular Java logging framework Log4j …
Security experts in an organization usually underestimate the presence of unauthorized cloud infrastructure …
Today, we want to introduce one more cloud security term: Cloud Infrastructure Entitlements Management (CIEM). …
Uncover attack paths and IAM policies allowing for privilege escalation.
Try now