Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/aquasecurity/cloudsec-icons
A collection of cloud security icons :cloud::lock:
https://github.com/aquasecurity/cloudsec-icons
cloud cloud-security hacktoberfest icons iconset security svg
Last synced: 3 months ago
JSON representation
A collection of cloud security icons :cloud::lock:
- Host: GitHub
- URL: https://github.com/aquasecurity/cloudsec-icons
- Owner: aquasecurity
- Created: 2022-01-26T12:57:13.000Z (almost 3 years ago)
- Default Branch: main
- Last Pushed: 2023-05-17T13:21:40.000Z (over 1 year ago)
- Last Synced: 2024-06-18T23:07:44.839Z (5 months ago)
- Topics: cloud, cloud-security, hacktoberfest, icons, iconset, security, svg
- Language: Go
- Homepage:
- Size: 2.32 MB
- Stars: 180
- Watchers: 5
- Forks: 18
- Open Issues: 4
-
Metadata Files:
- Readme: README.md
- Contributing: CONTRIBUTING.md
- License: LICENSE
Awesome Lists containing this project
- Awesome - Cloud Security Icons - A collection of cloud security icons ☁️🔒 (Development / Icons)
README
# Cloud Security Icons
These icons are published under the extremely permissive *Creative Commons Zero v1.0 Universal* license.
## Downloads
We provide all icon SVGs in both black and blue - download *icons.zip* from the [latest release](https://github.com/aquasecurity/cloudsec-icons/releases/latest).
## The Noun Project
We are now part of [The Noun Project](https://thenounproject.com/aquasec/) - the most comprehensive icon collection in the world!
## Iconfinder
We are also now available on [Iconfinder](https://www.iconfinder.com/search/icons?family=aqua-sec-cloud-icons)!
## Draw.io Library
We also provide a [draw.io](https://draw.io) library.
Here's how to use it to build awesome diagrams:
1. Download *draw.io.xml* from the [latest release](https://github.com/aquasecurity/cloudsec-icons/releases/latest).
2. Navigate to https://draw.io and create a new diagram.
3. Click `File -> Open Library from -> Device`
4. Select the *draw.io.xml* you downloaded in Step 1.## Icon Cheatsheet
AcademyAccept RiskAccessibilityAddAdhere to Policy
Alerts New RisksAlibaba CloudAmazon AWSAPI DocumentationAPI Keys
Approved Base ImagesAquaAqua EnforcerAqua PluginAqua Score
ArtifactsAssuranceAssurance ViolationAuditAudit Only
Binary FileBitcoin MiningBlock List Allow ListBlocked EventBrute Force Attack
C2ControlCalendarCattleChainBenchChange Password
ChangelogChangelog 2Check MarkChipCICD
CIS ComplianceCleanClockCloud AccountsCloud architect
Cloud MisconfigurationClusterCNAPPCNDRCode Repositories
CollectCollection ExfiltrationCommitCommunicationCompliance
Compliance ProgramComputerContainerContainer registryContinuous Deployment
Continuous IntegrationCount ArrowsCPUCVECyber Intel
DashboardData repositoryDatabaseDebianDetection Events
DeveloperDevOpsDevSecOpsDISA ComplianceDisconnected
DockerDomainDownDownloadDTA
DTA IconDTA RiskeBPFEditeLearning on demand
EnforcersEnforcers NotificationEnvironmentEventsEvidence
ExportExport PDFFailedFavoritesFederal Security
FileFilterFirewallFolderForbidden Labels
Full ScreenFunctionGarbageGatewayGateway New
GitHubGoalGroupsHackerHamburger
HeartbeatHoneypotHybridIaaSIaC
IAMIDEIgnoreImage Profile DetachedImage Unregistered
ImagesImportInbound ConnectionInfoInfrastructure
Infrastructure as CodeInitial ExecutionInsightsInsights 2Instructor lead training
IntegrationInventoryIPJenkinsKSPM
Kube HunterKubeEnforcerKubernetesLambda AmazonLeft
LinuxLockLogLogoutMalware Detection
Malware TrackingMega MenuMemoryMicroEnforcerMicrosoft Azure
MisconfigurationMitigationMore VerticalNanoEnforcerNautilus
Network ConnectionNetwork Connection WWWNo OrchNodesNotification Panel
NotificationsOffOKOnOpen Source
OpenShiftOS Package ManagerOSS LicenseOutbound ConnectionPending
PHPPlans and PricesPlans PricingPlayPod Enforcer
PodsPoliciesPolicy ViolationPostgreSQLPrivacy
PrivilegedProcessPrometheusPropagationProtect Containerized Apps
ProxyQuality AssuranceQuestion RoundRefreshRegistries
RemediationReportsResetResourceReverse
RightSaaSSASTSBOMScanning
ScheduleSCM AccountsSearchSecretsSecurity
Security CameraSecurity specialistSensitive DataServicesSettings
Settings GearShow MoreSIEMSOCSpeed
StampStorageStorage 2SuperuserSupplyChain
Support WebsiteSuppressTableTASTenant Manager
Third PartyToolsTreeTroubleshootingUbuntu
Unknown ImageUpUploadUsageVideo Camera
Virtual classroomVM EnforcerVolumevShieldVulnerability Score
WarningWarning RoundWeaponizationWordPressWorkloads
Workloads MisconfigurationZoomInZoomOut
## The Icon Grid
The icon grid establishes clear rules for the consistent, but flexible, positioning of graphic elements.
Keyline, minimalistic shapes are the foundation of the grid and define the boldness of our unique line of icons that reflect our values: We are the Experts, We are Bold. This grid was used also for the creation of Aqua Droplet Font.