Security Monkey logo

Security Monkey

Monitors AWS and GCP accounts for policy changes
+ 1

What is Security Monkey?

Security Monkey monitors your AWS and GCP accounts for policy changes and alerts on insecure configurations. Support is available for OpenStack public and private clouds. Security Monkey can also watch and monitor your GitHub organizations, teams, and repositories.
Security Monkey is a tool in the Security category of a tech stack.
Security Monkey is an open source tool with 4K GitHub stars and 772 GitHub forks. Here鈥檚 a link to Security Monkey's open source repository on GitHub

Who uses Security Monkey?

Security Monkey's Features

  • Single UI to browse and search all accounts, regions, and cloud services
  • Custom account types
  • Custom watchers
  • Custom auditors
  • Custom alerters

Security Monkey Alternatives & Comparisons

What are some alternatives to Security Monkey?
AWS Config
AWS Config is a fully managed service that provides you with an AWS resource inventory, configuration history, and configuration change notifications to enable security and governance. With AWS Config you can discover existing AWS resources, export a complete inventory of your AWS resources with all configuration details, and determine how a resource was configured at any point in time. These capabilities enable compliance auditing, security analysis, resource change tracking, and troubleshooting.
It is a robust, commercial-grade, and full-featured toolkit for the Transport Layer Security (TLS) and Secure Sockets Layer (SSL) protocols. It is also a general-purpose cryptography library.
Let's Encrypt
It is a free, automated, and open certificate authority brought to you by the non-profit Internet Security Research Group (ISRG).
The leading cybersecurity solution providing client-side protection against data loss, journey hijacking and intrusion while enhancing website performance. Assess and monitor privacy risk to protect against malicious JavaScript attacks.
Spring Security
It is a framework that focuses on providing both authentication and authorization to Java applications. The real power of Spring Security is found in how easily it can be extended to meet custom requirements.
See all alternatives

Security Monkey's Followers
10 developers follow Security Monkey to keep up with related blogs and decisions.
Radhwane Fellahi
Javier Gallego Romero
Sean Gribbin
Jeff Skeats
Paul Vardy
Ren茅 Milzarek
Doug Bromley