Skip to content
IAM Security Monitoring logo

IAM Security Monitoring

App
Ensures IAM Best practices are followed by your team to keep your source code safe. Alerts when there is violation detected
111 installs

Pricing

Developer plan available.

As developers and ops professionals, it's crucial for us to tighten up security around our Github accounts and repositories. After all securing source code is as important as securing any other cloud workload.

Cloudanix has taken an effort to offer IAM Security Monitoring for your Github accounts to ensure that along with other cloud workloads, your source code is secure as well. We have created a list of industry-recommended best practices and validate your account against this list.

Below are the "rules" we run against your account. You can configure these rules to "switch-off" (in case you think they are not relevant). You can also customize default values of parameters on certain rules for your team/ organization needs.

In addition to monitoring, we also give a great visualizing UX in form of a Dashboard. Lastly, viewing Drift or Historical data on your account is possible as well.

We check for:

  • Two Factor Authentication
  • User Email should be Private
  • Excessive number of owners
  • Org Default Permissions
  • Org MFA required
  • Org Plan Limit
  • Members MFA required
  • Outside Collaborator MFA required
  • Excessive number of Repo admins
  • Outside Collaborator As Admin
  • Repo Deployment Keys Rotated
  • GPG Keys rotations

Please see https://docs.cloudanix.com/github/audit/ghiam for additional details

Your Dashboard gives you quick and rich overview of security posture of your account and repositories.

Plans and pricing

It's a free plan which ensures that your Github accounts are secure and follow all the best practices.
$0
  • Connect and monitor upto 10 organizations or personal accounts
  • No limit on the number of repos each account has
  • Unlimited number of your team members can give given access to Role based governed Dashboard
  • Complete audit trial of changes on your security posture

Next: Confirm your installation location

IAM Security Monitoring is provided by a third-party and is governed by separate terms of service, privacy policy, and support documentation

About

Ensures IAM Best practices are followed by your team to keep your source code safe. Alerts when there is violation detected
111 installs

Pricing

Developer plan available.