Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/Azure/Cloud-Katana
Unlocking Serverless Computing to Assess Security Controls
https://github.com/Azure/Cloud-Katana
Last synced: 3 months ago
JSON representation
Unlocking Serverless Computing to Assess Security Controls
- Host: GitHub
- URL: https://github.com/Azure/Cloud-Katana
- Owner: Azure
- License: mit
- Created: 2021-07-20T03:17:25.000Z (over 3 years ago)
- Default Branch: main
- Last Pushed: 2024-03-15T10:44:53.000Z (8 months ago)
- Last Synced: 2024-04-02T15:18:18.850Z (7 months ago)
- Language: PowerShell
- Size: 10.5 MB
- Stars: 231
- Watchers: 8
- Forks: 33
- Open Issues: 1
-
Metadata Files:
- Readme: README.md
- License: LICENSE
- Code of conduct: CODE_OF_CONDUCT.md
- Security: SECURITY.md
Awesome Lists containing this project
- awesome-cloud-security - Cloud-Katana - cloud and hybrid cloud environments. (Infrastructure)
- Awesome-Azure-Pentest - Cloud Katana - Unlocking Serverless Computing to Assess Security Controls (Tools / Information Gathering)
README
# Cloud Katana
[![Jupyter Book Badge](https://jupyterbook.org/badge.svg)](https://cloud-katana.com)
[![BlackHat Arsenal 2021](https://raw.githubusercontent.com/toolswatch/badges/master/arsenal/usa/2021.svg)](https://www.blackhat.com/us-21/arsenal/schedule/#cloud-katana-24120)
About •
Documentation •
Contributing •
Trademarks •
References---
Unlocking Serverless Computing to Assess Security Controls
![](resources/images/Logo.png)
## About
Cloud Katana is a cloud native tool developed from the need to automate the execution of simulation steps in multi-cloud and hybrid cloud environments. This tool is an event-driven, serverless compute application built on the top of [Azure Functions](https://docs.microsoft.com/en-us/azure/azure-functions/functions-overview) that expedites the research process and assessment of security controls. We are currently covering use cases in Azure, but we are working on extending it to other cloud providers.
## Documentation
Our official documentation is built with [Jupyter Book](https://jupyterbook.org/intro.html)!
## [https://cloud-katana.com](https://cloud-katana.com)
## Deployment
Make sure you read the deployment documentation before using the button below:
[![Deploy to Azure](https://aka.ms/deploytoazurebutton)](https://portal.azure.com/#create/Microsoft.Template/uri/https%3a%2f%2fraw.githubusercontent.com%2fAzure%2fCloud-Katana%2fmain%2fazuredeploy.json)
## Contributing
This project welcomes contributions and suggestions. Most contributions require you to agree to a
Contributor License Agreement (CLA) declaring that you have the right to, and actually do, grant us
the rights to use your contribution. For details, visit https://cla.opensource.microsoft.com.When you submit a pull request, a CLA bot will automatically determine whether you need to provide
a CLA and decorate the PR appropriately (e.g., status check, comment). Simply follow the instructions
provided by the bot. You will only need to do this once across all repos using our CLA.This project has adopted the [Microsoft Open Source Code of Conduct](https://opensource.microsoft.com/codeofconduct/).
For more information see the [Code of Conduct FAQ](https://opensource.microsoft.com/codeofconduct/faq/) or
contact [[email protected]](mailto:[email protected]) with any additional questions or comments.## Trademarks
This project may contain trademarks or logos for projects, products, or services. Authorized use of Microsoft
trademarks or logos is subject to and must follow
[Microsoft's Trademark & Brand Guidelines](https://www.microsoft.com/en-us/legal/intellectualproperty/trademarks/usage/general).
Use of Microsoft trademarks or logos in modified versions of this project must not cause confusion or imply Microsoft sponsorship.
Any use of third-party trademarks or logos are subject to those third-party's policies.## References:
* https://github.com/AzureAD/microsoft-authentication-library-for-python
* https://github.com/AzureAD/microsoft-authentication-library-for-python/wiki/Using-the-acquired-token-to-call-a-protected-Web-API
* https://docs.microsoft.com/en-us/azure/app-service/scenario-secure-app-access-microsoft-graph-as-app?tabs=azure-cli%2Ccommand-line
* https://docs.microsoft.com/en-us/azure/app-service/overview-managed-identity?tabs=powershell
* https://devblogs.microsoft.com/scripting/generate-random-letters-with-powershell/
* https://docs.microsoft.com/en-us/graph/api/overview?view=graph-rest-1.0
* https://docs.microsoft.com/en-us/graph/permissions-reference
* https://docs.microsoft.com/en-us/azure/active-directory-b2c/tokens-overview