https://github.com/aquasecurity/cloudsec-icons
A collection of cloud security icons :cloud::lock:
https://github.com/aquasecurity/cloudsec-icons
cloud cloud-security hacktoberfest icons iconset security svg
Last synced: about 1 month ago
JSON representation
A collection of cloud security icons :cloud::lock:
- Host: GitHub
- URL: https://github.com/aquasecurity/cloudsec-icons
- Owner: aquasecurity
- Created: 2022-01-26T12:57:13.000Z (almost 4 years ago)
- Default Branch: main
- Last Pushed: 2023-05-17T13:21:40.000Z (over 2 years ago)
- Last Synced: 2025-04-14T16:45:33.755Z (7 months ago)
- Topics: cloud, cloud-security, hacktoberfest, icons, iconset, security, svg
- Language: Go
- Homepage:
- Size: 2.32 MB
- Stars: 189
- Watchers: 3
- Forks: 19
- Open Issues: 4
-
Metadata Files:
- Readme: README.md
- Contributing: CONTRIBUTING.md
- License: LICENSE
Awesome Lists containing this project
- Awesome - Cloud Security Icons - A collection of cloud security icons ☁️🔒 (Development / Icons)
README
# Cloud Security Icons
These icons are published under the extremely permissive *Creative Commons Zero v1.0 Universal* license.
## Downloads
We provide all icon SVGs in both black and blue - download *icons.zip* from the [latest release](https://github.com/aquasecurity/cloudsec-icons/releases/latest).
## The Noun Project
We are now part of [The Noun Project](https://thenounproject.com/aquasec/) - the most comprehensive icon collection in the world!
## Iconfinder
We are also now available on [Iconfinder](https://www.iconfinder.com/search/icons?family=aqua-sec-cloud-icons)!
## Draw.io Library
We also provide a [draw.io](https://draw.io) library.
Here's how to use it to build awesome diagrams:
1. Download *draw.io.xml* from the [latest release](https://github.com/aquasecurity/cloudsec-icons/releases/latest).
2. Navigate to https://draw.io and create a new diagram.
3. Click `File -> Open Library from -> Device`
4. Select the *draw.io.xml* you downloaded in Step 1.
## Icon Cheatsheet





AcademyAccept RiskAccessibilityAddAdhere to Policy





Alerts New RisksAlibaba CloudAmazon AWSAPI DocumentationAPI Keys





Approved Base ImagesAquaAqua EnforcerAqua PluginAqua Score





ArtifactsAssuranceAssurance ViolationAuditAudit Only





Binary FileBitcoin MiningBlock List Allow ListBlocked EventBrute Force Attack





C2ControlCalendarCattleChainBenchChange Password





ChangelogChangelog 2Check MarkChipCICD





CIS ComplianceCleanClockCloud AccountsCloud architect





Cloud MisconfigurationClusterCNAPPCNDRCode Repositories





CollectCollection ExfiltrationCommitCommunicationCompliance





Compliance ProgramComputerContainerContainer registryContinuous Deployment





Continuous IntegrationCount ArrowsCPUCVECyber Intel





DashboardData repositoryDatabaseDebianDetection Events





DeveloperDevOpsDevSecOpsDISA ComplianceDisconnected





DockerDomainDownDownloadDTA





DTA IconDTA RiskeBPFEditeLearning on demand





EnforcersEnforcers NotificationEnvironmentEventsEvidence





ExportExport PDFFailedFavoritesFederal Security





FileFilterFirewallFolderForbidden Labels





Full ScreenFunctionGarbageGatewayGateway New





GitHubGoalGroupsHackerHamburger





HeartbeatHoneypotHybridIaaSIaC





IAMIDEIgnoreImage Profile DetachedImage Unregistered





ImagesImportInbound ConnectionInfoInfrastructure





Infrastructure as CodeInitial ExecutionInsightsInsights 2Instructor lead training





IntegrationInventoryIPJenkinsKSPM





Kube HunterKubeEnforcerKubernetesLambda AmazonLeft





LinuxLockLogLogoutMalware Detection





Malware TrackingMega MenuMemoryMicroEnforcerMicrosoft Azure





MisconfigurationMitigationMore VerticalNanoEnforcerNautilus





Network ConnectionNetwork Connection WWWNo OrchNodesNotification Panel





NotificationsOffOKOnOpen Source





OpenShiftOS Package ManagerOSS LicenseOutbound ConnectionPending





PHPPlans and PricesPlans PricingPlayPod Enforcer





PodsPoliciesPolicy ViolationPostgreSQLPrivacy





PrivilegedProcessPrometheusPropagationProtect Containerized Apps





ProxyQuality AssuranceQuestion RoundRefreshRegistries





RemediationReportsResetResourceReverse





RightSaaSSASTSBOMScanning





ScheduleSCM AccountsSearchSecretsSecurity





Security CameraSecurity specialistSensitive DataServicesSettings





Settings GearShow MoreSIEMSOCSpeed





StampStorageStorage 2SuperuserSupplyChain





Support WebsiteSuppressTableTASTenant Manager





Third PartyToolsTreeTroubleshootingUbuntu





Unknown ImageUpUploadUsageVideo Camera





Virtual classroomVM EnforcerVolumevShieldVulnerability Score





WarningWarning RoundWeaponizationWordPressWorkloads



Workloads MisconfigurationZoomInZoomOut
## The Icon Grid
The icon grid establishes clear rules for the consistent, but flexible, positioning of graphic elements.

Keyline, minimalistic shapes are the foundation of the grid and define the boldness of our unique line of icons that reflect our values: We are the Experts, We are Bold. This grid was used also for the creation of Aqua Droplet Font.
