You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+20-14Lines changed: 20 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,7 +11,7 @@
11
11
12
12
CloudGraph is the free open-source universal **GraphQL API and Cloud Security Posture Management (CSPM) tool for AWS, Azure, GCP, and K8s**. With CloudGraph you get:
13
13
14
-
- Free and effortless _compliance checks_ (i.e. CIS 1.2)
-_Type-Safe asset inventories_ for all of your resources in all of your cloud environments
16
16
- Automatically generated documentation and query validation - know if your query is valid before you send it!
17
17
- Full resource data including _relationships_ between resources so you can understand context
@@ -149,14 +149,15 @@ Under the hood, CloudGraph reaches out to your cloud provider(s), sucks up all o
149
149
150
150
# Authentication and Permissions
151
151
152
-
CloudGraph currently supports AWS, Azure, GCP, and K8s (several others coming soon). CloudGraph needs read permissions in order to ingest your data. To keep things easy you can use the same permissions that we use internally when we run CloudGraph to power AutoCloud. Here are the auth guides and details for how to generate credentials for each provider (feel free to leave out AutoCloud specific configuration):
152
+
CloudGraph currently supports AWS, Azure, GCP, K8s, and Tencent (several others coming soon). CloudGraph needs read permissions in order to ingest your data. To keep things easy you can use the same permissions that we use internally when we run CloudGraph to power AutoCloud. Here are the auth guides and details for how to generate credentials for each provider (feel free to leave out AutoCloud specific configuration):
You can then add the providers you want (links to provider repos: [AWS](https://github.com/cloudgraphdev/cloudgraph-provider-aws), [Azure](https://github.com/cloudgraphdev/cloudgraph-provider-azure), [GCP](https://github.com/cloudgraphdev/cloudgraph-provider-gcp), [K8s](https://github.com/cloudgraphdev/cloudgraph-provider-k8s)):
197
+
You can then add the providers you want (links to provider repos: [AWS](https://github.com/cloudgraphdev/cloudgraph-provider-aws), [Azure](https://github.com/cloudgraphdev/cloudgraph-provider-azure), [GCP](https://github.com/cloudgraphdev/cloudgraph-provider-gcp), [K8s](https://github.com/cloudgraphdev/cloudgraph-provider-k8s), [Tencent Docs](https://github.com/cloudgraphdev/cloudgraph-provider-tencent)):
197
198
198
199
```bash
199
200
cg init aws
200
201
cg init azure
201
202
cg init gcp
202
203
cg init k8s
204
+
cg init tencent
203
205
```
204
206
205
207
You can also add as many as you want all at once
206
208
207
209
```bash
208
-
cg init aws azure gcp k8s
210
+
cg init aws azure gcp k8s tencent
209
211
```
210
212
211
213
And add in compliance policy packs to supplement your data with instant security insights:
212
214
213
215
```bash
214
-
cg policy add aws-cis-1.2.0
215
216
cg policy add gcp-cis-1.2.0
216
217
cg policy add azure-cis-1.3.1
218
+
cg policy add aws-cis-1.2.0
219
+
cg policy add aws-cis-1.3.0
220
+
cg policy add aws-cis-1.2.0
221
+
cg policy add aws-pci-dss-3.2.1
222
+
cg policy add aws-nist-800-53-rev4
217
223
```
218
224
219
225
You can find a list of currently supported policy packs in the [Policy Packs repo](https://github.com/cloudgraphdev/cloudgraph-policy-packs)
0 commit comments