You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Fix Inventory detects compliance and security risks in cloud infrastructure accounts.
10
+
Fix Inventory detects compliance and security risks in cloud infrastructure accounts.
11
11
12
12
We built Fix Inventory for cloud and security engineers as an open source alternative to proprietary cloud security tools like Orca Security, Prisma Cloud or Wiz.
13
13
14
-
Check out our [Quick Start Guide](https://fixinventory.org/getting-started) for step-by-step instructions on getting started.
14
+
Check out our [Quick Start Guide](https://fixinventory.org/getting-started) for step-by-step instructions on getting started.
15
15
16
16
## 💡Why Fix Inventory?
17
17
@@ -27,12 +27,12 @@ Fix Inventory was built from the ground up for cloud-native infrastructure. Fix
27
27
28
28
If you want to collect data for resources that are not supported yet, you can use our [example collector](https://github.com/someengineering/fixinventory/tree/main/plugins/example_collector) to write your own collectors.
29
29
30
-
The tool works in three phases:
30
+
The tool works in three phases:
31
31
32
32
1.**Collect inventory data**: Fix Inventory queries cloud infrastructure APIs (aka “agentless”) for metadata about the resources in your cloud accounts.
33
-
33
+
34
34
2.**Normalize cloud data**: Fix Inventory creates a graph schema to normalize the universe of detected cloud resources, their configurations, and relationships.
35
-
35
+
36
36
3.**Triage security risks**: Fix Inventory scans the collected data with custom and pre-configured compliance frameworks to search for misconfigurations, risks, and other security issues.
37
37
38
38
Fix Inventory also provides ways to export and integrate the data it collects to build alerting and remediation workflows.
@@ -41,9 +41,9 @@ Fix Inventory also provides ways to export and integrate the data it collects to
41
41
42
42
In cloud-native infrastructure, misconfigurations from developer activity and frequent updates through automation are a fact of life. It's impossible to catch all misconfigurations before they reach production, so the key question becomes: how quickly can you identify and fix (hence the name…) the most critical risks?
43
43
44
-
Traditional cloud security tools struggle to answer basic questions such as “what’s the blast radius of this public resource?” or “is there a path to get from this resource to a privileged role?”, because they lack the context from the hidden dependencies between cloud resources.
44
+
Traditional cloud security tools struggle to answer basic questions such as “what’s the blast radius of this public resource?” or “is there a path to get from this resource to a privileged role?”, because they lack the context from the hidden dependencies between cloud resources.
45
45
46
-
We believe that the only effective approach is to use a graph-based data model that works across all cloud platforms.
46
+
We believe that the only effective approach is to use a graph-based data model that works across all cloud platforms.
47
47
48
48
-**Deploy anywhere:** Fix Inventory can be deployed on your laptop or in the cloud, and we also offer a SaaS version.
49
49
@@ -60,19 +60,19 @@ We believe that the only effective approach is to use a graph-based data model t
60
60
Fix Inventory supports common cloud security use cases.
61
61
62
62
-**Cloud Security Posture Management (CSPM)**: Monitor and enforce security policies across your cloud infrastructure, Identify and remediate misconfigurations.
63
-
63
+
64
64
-**AI Security Posture Management (AI-SPM)**: Automatic discovery of AI services in use, and the data sources they connect to.
65
-
65
+
66
66
-**Cloud Compliance**: Run automated compliance assessments across your cloud accounts with standard compliance frameworks.
67
-
67
+
68
68
-**Cloud Infrastructure Entitlement Management (CIEM)**: Discover human and non-human identities (NHI), detect risky service accounts with access to sensitive data.
69
69
70
70
-**Cloud Asset Inventory:** Gain visibility into your multi-cloud environments by collecting, normalizing, unifying resource configuration data and prevent shadow IT
71
-
71
+
72
72
-**Container & Kubernetes Security**: Get complete visibility, from individual containers and Kubernetes objects to namespaces, nodes, clusters, and the underlying cloud infrastructure.
73
-
73
+
74
74
-**Security Data Fabric**: Integrate security data from multiple cloud providers into a single place and export data for usage in other systems and databases.
75
-
75
+
76
76
-**Policy-as-code:** Script and apply policies across your multi-cloud infrastructure and establish best practices for reliability, cost control, and resource configurations.
77
77
78
78
Please also see [Fix Security](https://fix.security/), our hosted SaaS offering that is built on top of Fix Inventory.
@@ -83,16 +83,16 @@ Three concepts are helpful to understand how Fix Inventory works and how it’s
83
83
84
84
### 1. Normalized cloud data
85
85
86
-
Fix Inventory has knowledge of the provider-specific data model for every resource. To collect metadata from every cloud, Fix Inventory uses a pluggable architecture. Each collector plugin includes logic to extract data from the cloud provider APIs.
86
+
Fix Inventory has knowledge of the provider-specific data model for every resource. To collect metadata from every cloud, Fix Inventory uses a pluggable architecture. Each collector plugin includes logic to extract data from the cloud provider APIs.
87
87
88
-
Post-collection, Fix Inventory normalizes the data and maps it to our [unified data model](https://inventory.fix.security/reference/unified-data-model) with [common properties](https://inventory.fix.security/reference/unified-data-model#resource-base-kind), [static typing](https://inventory.fix.security/reference/unified-data-model#complex-and-simple-kinds) and [inheritance](https://inventory.fix.security/reference/unified-data-model#resource-hierarchy).
88
+
Post-collection, Fix Inventory normalizes the data and maps it to our [unified data model](https://inventory.fix.security/reference/unified-data-model) with [common properties](https://inventory.fix.security/reference/unified-data-model#resource-base-kind), [static typing](https://inventory.fix.security/reference/unified-data-model#complex-and-simple-kinds) and [inheritance](https://inventory.fix.security/reference/unified-data-model#resource-hierarchy).
89
89
90
-
In Fix Inventory, everything is a `resource` - cloud services, users, policies, etc.
90
+
In Fix Inventory, everything is a `resource` - cloud services, users, policies, etc.
-`cloud`, `account`, and `region` data denote the location of each resource.
94
94
95
-
The mapping with common properties, static typing and inheritance allow you to interact with resources across cloud providers in a consistent fashion.
95
+
The mapping with common properties, static typing and inheritance allow you to interact with resources across cloud providers in a consistent fashion.
96
96
97
97
For example, resource time stamps in Fix Inventory are normalized, which allows the use of relative times. Assume we want to find resources created in the last 3 days, no matter which cloud. Then we could express this with a relative duration string:
98
98
@@ -110,7 +110,7 @@ Fix Inventory comes with a human-readable query language, and the user interface
110
110
111
111
- Which resources are incorrectly tagged?
112
112
113
-
Due to its statically typed data model, you can search for names, strings, or numbers in any combination. You can also leverage the dependency and access graph to include the relationships between resources, users, and permissions in your searches. Fix Inventory also supports [full-text search](https://inventory.fix.security/reference/search/full-text).
113
+
Due to its statically typed data model, you can search for names, strings, or numbers in any combination. You can also leverage the dependency and access graph to include the relationships between resources, users, and permissions in your searches. Fix Inventory also supports [full-text search](https://inventory.fix.security/reference/search/full-text).
114
114
115
115
One key purpose of our query language is to define rules and policies that govern how your infrastructure should behave and then automatically trigger alerts and actions when these rules are violated.
116
116
@@ -130,15 +130,15 @@ Fix Inventory ships with industry-standard benchmarks, like the CIS Benchmarks f
130
130
131
131
### Dependency and access graph
132
132
133
-
Fix Inventory stores relationships between resources in your cloud environment to understand logical dependencies and detect hidden pathways to potential breaches. You can:
133
+
Fix Inventory stores relationships between resources in your cloud environment to understand logical dependencies and detect hidden pathways to potential breaches. You can:
134
134
135
135
- Query complex relationships across cloud layers.
136
-
136
+
137
137
- Add context by filtering for resource properties.
138
-
138
+
139
139
- Visualize search outputs to make risks more understandable.
140
140
141
-
For example, suppose I want to understand which S3 buckets in my infrastructure a user “Matthias” has write access to. In that case, I can write a query that uses the IAM (identity access management) graph to find out. I can pipe the search results into a [DOT file](https://en.wikipedia.org/wiki/DOT_(graph_description_language)) and create a visualization that explains relationships to people without cloud or security expertise.
141
+
For example, suppose I want to understand which S3 buckets in my infrastructure a user “Matthias” has write access to. In that case, I can write a query that uses the IAM (identity access management) graph to find out. I can pipe the search results into a [DOT file](https://en.wikipedia.org/wiki/DOT_(graph_description_language)) and create a visualization that explains relationships to people without cloud or security expertise.
142
142
143
143
```bash
144
144
> search --with-edges is(aws_iam_user) and name=matthias -iam[0:]{permissions[*].level==write}-> is(aws_iam_user, aws_s3_bucket) | format --dot
@@ -150,19 +150,19 @@ Read more about [traversing the graph](https://inventory.fix.security/concepts/a
150
150
151
151
## 💖 Community
152
152
153
-
Fix Inventory is an open-source project by Some Engineering. Contact us on [our Discord server](https://discord.gg/fixsecurity) for:
153
+
Fix Inventory is an open-source project by Some Engineering. Contact us on [our Discord server](https://discord.gg/XvpyRQ4yj2) for:
154
154
155
155
- help with getting started
156
-
156
+
157
157
- issues you encounter
158
-
158
+
159
159
- writing queries
160
-
160
+
161
161
- using the dependency and access graph
162
162
163
163
## 🙏 Contributing
164
164
165
-
Feel free to [open a GitHub issue](https://github.com/someengineering/fixinventory/issues/new) for small fixes and changes. For bigger changes and new plugins, please open an issue first to prevent duplicated work and to have the relevant discussions first.
165
+
Feel free to [open a GitHub issue](https://github.com/someengineering/fixinventory/issues/new) for small fixes and changes. For bigger changes and new plugins, please open an issue first to prevent duplicated work and to have the relevant discussions first.
166
166
167
167
Please follow our [contribution guidelines](https://inventory.fix.security/development) to get started.
Copy file name to clipboardExpand all lines: fixcore/README.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -65,7 +65,7 @@ More information can be found in [the docs](https://inventory.fix.security/docs/
65
65
66
66
67
67
## Contact
68
-
If you have any questions feel free to [join our Discord](https://discord.gg/fixsecurity) or [open a GitHub issue](https://github.com/someengineering/fix/issues/new).
68
+
If you have any questions feel free to [join our Discord](https://discord.gg/XvpyRQ4yj2) or [open a GitHub issue](https://github.com/someengineering/fix/issues/new).
Copy file name to clipboardExpand all lines: fixlib/README.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -13,7 +13,7 @@ Fix Inventory common library
13
13
This is the Fix Inventory common library. Any functionality that is required by more than one of [our components](https://github.com/someengineering/fixinventory#component-list) will be put in here.
14
14
15
15
## Contact
16
-
If you have any questions feel free to [join our Discord](https://discord.gg/fixsecurity) or [open a GitHub issue](https://github.com/someengineering/fixinventory/issues/new).
16
+
If you have any questions feel free to [join our Discord](https://discord.gg/XvpyRQ4yj2) or [open a GitHub issue](https://github.com/someengineering/fixinventory/issues/new).
Copy file name to clipboardExpand all lines: fixmetrics/README.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -183,7 +183,7 @@ This is the core functionality `fixmetrics` provides.
183
183
184
184
185
185
## Contact
186
-
If you have any questions feel free to [join our Discord](https://discord.gg/fixsecurity) or [open a GitHub issue](https://github.com/someengineering/fix/issues/new).
186
+
If you have any questions feel free to [join our Discord](https://discord.gg/XvpyRQ4yj2) or [open a GitHub issue](https://github.com/someengineering/fix/issues/new).
Copy file name to clipboardExpand all lines: fixshell/README.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -89,7 +89,7 @@ search is(aws_ec2_volume) and volume_status = available and ctime < -30d and ati
89
89
90
90
91
91
## Contact
92
-
If you have any questions feel free to [join our Discord](https://discord.gg/fixsecurity) or [open a GitHub issue](https://github.com/someengineering/fix/issues/new).
92
+
If you have any questions feel free to [join our Discord](https://discord.gg/XvpyRQ4yj2) or [open a GitHub issue](https://github.com/someengineering/fix/issues/new).
Copy file name to clipboardExpand all lines: fixworker/README.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -74,7 +74,7 @@ search id = i-039e06bb2539e5484 | tag update owner lukas
74
74
75
75
76
76
## Contact
77
-
If you have any questions feel free to [join our Discord](https://discord.gg/fixsecurity) or [open a GitHub issue](https://github.com/someengineering/fix/issues/new).
77
+
If you have any questions feel free to [join our Discord](https://discord.gg/XvpyRQ4yj2) or [open a GitHub issue](https://github.com/someengineering/fix/issues/new).
0 commit comments