|
1 | | -<p align="center"><picture><source media="(prefers-color-scheme: dark)" srcset="/misc/fixinventory_200-darkmode.png"><source media="(prefers-color-scheme: light)" srcset="/misc/fixinventory_200-lightmode.png"><img alt="Fix Inventory" src="/misc/fixinventory_200-lightmode.png"></picture></p> |
2 | | - |
3 | | -<p align="center"><img src="/misc/fixinventory_banner.png"/></p> |
| 1 | + |
4 | 2 |
|
5 | 3 | [](https://github.com/someengineering/fixinventory/tags/) |
6 | 4 | [](https://github.com/someengineering/fixinventory/commits/main) |
|
9 | 7 | [](https://app.snyk.io/org/some-engineering-inc./projects) |
10 | 8 | [](https://codecov.io/gh/someengineering/fixinventory) |
11 | 9 |
|
12 | | -Fix Inventory detects compliance and security risks in cloud infrastructure accounts. Fix Inventory is open source and was built for cloud and security engineers. |
| 10 | +Fix Inventory detects compliance and security risks in cloud infrastructure accounts. |
| 11 | + |
| 12 | +We built Fix Inventory for cloud and security engineers as an open source alternative to proprietary cloud security tools like Orca Security, Prisma Cloud or Wiz. |
13 | 13 |
|
14 | 14 | Check out our [Quick Start Guide](https://inventory.fix.security/docs/getting-started/) for step-by-step instructions on getting started. |
15 | 15 |
|
@@ -57,7 +57,7 @@ We believe that the only effective approach is to use a graph-based data model t |
57 | 57 |
|
58 | 58 | ## 🛠️ Use cases |
59 | 59 |
|
60 | | -Fix Inventory supports common cloud security use cases, and is an open source alternative to proprietary cloud security tools like Orca Security, Prisma Cloud or Wiz. |
| 60 | +Fix Inventory supports common cloud security use cases. |
61 | 61 |
|
62 | 62 | - **Cloud Security Posture Management (CSPM)**: Monitor and enforce security policies across your cloud infrastructure, Identify and remediate misconfigurations. |
63 | 63 |
|
@@ -144,6 +144,8 @@ For example, suppose I want to understand which S3 buckets in my infrastructure |
144 | 144 | > search --with-edges is(aws_iam_user) and name=matthias -iam[0:]{permissions[*].level==write}-> is(aws_iam_user, aws_s3_bucket) | format --dot |
145 | 145 | ``` |
146 | 146 |
|
| 147 | + |
| 148 | +
|
147 | 149 | Read more about [traversing the graph](https://inventory.fix.security/concepts/asset-inventory-graph#traversal) in our docs. Fix Security, our hosted SaaS product, offers these visualizations out of the box. |
148 | 150 |
|
149 | 151 | ## 💖 Community |
|
0 commit comments