List of AWS CloudFormation Integrations

This is a list of platforms and tools that integrate with AWS CloudFormation. This list is updated as of May 2026.

  • 1
    Roost.ai Reviews & Ratings

    Roost.ai

    Roost.ai

    Automate testing, enhance coverage, and accelerate development effortlessly.
    Roost.ai is a cutting-edge software testing solution that leverages generative AI alongside leading large language models like GPT-4, Gemini, Claude, and Llama3 to automate the generation of unit and API test cases, ensuring thorough test coverage. The platform seamlessly integrates with widely-used DevOps tools such as GitHub, GitLab, Bitbucket, Azure DevOps, Terraform, and CloudFormation, providing automated updates to tests in response to code changes and pull requests. It supports a range of programming languages, including Java, Go, Python, Node.js, and C#, and is also capable of producing tests for various frameworks such as JUnit, TestNG, pytest, and Go's standard testing package. Furthermore, Roost.ai offers the ability to create temporary test environments on demand, facilitating acceptance testing and reducing the time and resources required for quality assurance. By automating tedious testing tasks and enhancing overall test coverage, Roost.ai empowers development teams to focus on innovation while accelerating their release cycles, ultimately boosting productivity and efficiency in software development. This forward-thinking testing methodology not only optimizes workflows but also plays a significant role in delivering higher-quality software products. As a result, organizations can enjoy greater confidence in their software's reliability and performance.
  • 2
    Compliance Warden Reviews & Ratings

    Compliance Warden

    Compliance Warden

    Achieve seamless compliance with real-time, developer-friendly solutions.
    Compliance Warden is tailored for modern teams aiming to blend agility with strong security protocols. Each time a developer submits a pull request, our platform performs a real-time evaluation of the code, verifying compliance with key industry standards, including SOC 2, ISO 27001, PCI DSS, and NIST. With the inclusion of AI-powered, inline corrections available directly within GitHub or VS Code, developers can rectify issues promptly, while compliance officers gain immediate access to detailed insights via comprehensive dashboards, scoring metrics, and documentation ready for audits. By accommodating platforms such as AWS, Azure, Terraform, CloudFormation, Pulumi, and several others, Compliance Warden promotes a continuous, proactive, and user-friendly compliance approach, optimizing the process for teams. This not only boosts efficiency but also aids organizations in sustaining a robust security posture during application development, ensuring they remain vigilant and prepared against potential threats. Ultimately, Compliance Warden provides a seamless integration of security and innovation for development teams.
  • 3
    Coverity Static Analysis Reviews & Ratings

    Coverity Static Analysis

    Black Duck

    Transform your code with unmatched security and quality assurance.
    Coverity Static Analysis acts as a comprehensive tool for scanning code, aiding developers and security teams in creating high-quality software that aligns with security, functional safety, and various industry benchmarks. It adeptly identifies complex issues within extensive codebases, effectively highlighting and resolving quality and security vulnerabilities that may occur across different files and libraries. By ensuring compliance with multiple standards such as OWASP Top 10, CWE Top 25, MISRA, and CERT C/C++/Java, Coverity provides detailed reports that facilitate the tracking and prioritization of potential issues. Utilizing the Code Sight™ IDE plugin allows developers to receive instant feedback, including guidance on CWE and remediation strategies, which is seamlessly integrated into their development environments. This integration not only promotes security practices throughout the software development lifecycle but also helps maintain high levels of developer productivity. Furthermore, the use of this tool significantly enhances code reliability and cultivates a proactive approach to software security enhancement among teams.
  • 4
    ThreatModeler Reviews & Ratings

    ThreatModeler

    ThreatModeler

    Automate threat modeling for secure applications effortlessly today!
    ThreatModeler™ is an innovative enterprise threat modeling platform that automates the process of developing secure applications, significantly minimizing the necessary effort in this crucial area. In today's rapidly evolving digital landscape, information security professionals face an urgent demand to construct comprehensive threat models that encompass their organization’s data and software. Our platform operates at the expansive scale of their IT ecosystem while keeping pace with the speed of innovation. By leveraging ThreatModeler™, enterprise IT organizations can seamlessly integrate their specific security requirements and policies into the broader cyber ecosystem. This capability offers real-time insights into their threat portfolio and associated risks. As a result, InfoSec executives and CISOs acquire a thorough understanding of their entire attack landscape, alongside their defense-in-depth strategies and compensating controls, enabling them to allocate resources more strategically and enhance their operational efficiency. Consequently, this empowers organizations to proactively identify vulnerabilities and respond effectively to emerging threats.
  • 5
    Userify Reviews & Ratings

    Userify

    Userify

    Streamline SSH key management with robust security and compliance.
    Efficiently oversee SSH keys for your team across diverse cloud platforms and global locations by leveraging tools such as Ansible, Chef, Puppet, Salt, CloudFormation, Terraform, or custom scripts. Userify operates smoothly across multiple cloud services that are widely distributed and can handle high-latency networks. It incorporates advanced security protocols, including Curve 25519 encryption and bcrypt hashing, ensuring adherence to PCI-DSS and HIPAA regulations. In addition, Userify has achieved AICPA SOC-2 Type 1 certification and is relied upon by over 3,500 organizations around the globe. The solution's passwordless SSH key login feature not only enhances security but also facilitates user convenience. Notably, it stands out as the only key management tool engineered to work effectively over the open Internet. Userify makes the removal of departing administrators incredibly straightforward, reducing the de-provisioning process to a single click. It also aids in fulfilling PCI-DSS Requirement 8, which is essential for protecting personally identifiable information (PII) while completely phasing out the default ec2-user account. Additionally, Userify supports compliance with the HIPAA Security Rule, thereby safeguarding essential healthcare systems and protected health information (PHI) by limiting internal access and control. This comprehensive approach ensures that organizations can maintain high security standards while efficiently managing their SSH key infrastructure.
  • 6
    discrimiNAT Firewall Reviews & Ratings

    discrimiNAT Firewall

    Chaser Systems

    Effortless egress filtering for secure, scalable cloud networking.
    The discrimiNAT addresses the challenge of not being able to specify hostnames or fully qualified domain names (FQDNs) in Google Cloud Firewall Rules and AWS Security Groups, facilitating efficient and scalable egress filtering. Utilizing a Deep Packet Inspection engine, it oversees and restricts traffic without the need for decryption, serving as a highly available NAT Instance at the egress point of your VPC network. Designed with user-friendliness in mind, you only need to input the allowed destination FQDNs in your applications' outbound rules, and the firewall takes care of the rest without any hassle. To appreciate its ease of use, feel free to watch the concise video demonstrations provided. Our solution accommodates everything from fully integrated multi-zone network configurations that can be launched with a single click, complete with practical defaults, to customizable instance setups, giving users the flexibility to adapt their networking arrangements as desired. Furthermore, we supply an extensive array of ready-to-use templates in our CloudFormation library for AWS and as a Deployment Manager template for Google Cloud, ensuring that users can quickly implement robust and effective security solutions. This approach not only enhances security but also streamlines the process of managing network configurations across different platforms.
  • 7
    AWS Connected Vehicle Solution Reviews & Ratings

    AWS Connected Vehicle Solution

    Amazon

    Empower automotive innovation with seamless, secure cloud connectivity.
    Amazon Web Services (AWS) enables automotive producers and their suppliers to develop serverless Internet of Things (IoT) applications that gather, process, analyze, and react to data from connected vehicles, all while removing the burden of infrastructure management. Through AWS IoT, users can safely connect vehicles and devices to the AWS Cloud, resulting in reduced latency and lower expenses. To enhance the development and launching of cutting-edge connected vehicle services, AWS offers a connected vehicle solution that guarantees secure access to the AWS Cloud and provides a structure for incorporating AWS IoT and AWS Greengrass within the Automotive Grade Linux (AGL) software infrastructure. This solution includes local processing capabilities in vehicles, sophisticated event rules, and various options for data management and storage. The framework aims to simplify the creation of connected vehicle services, empowering developers to focus on further improving the features of their solutions. By utilizing these resources, automotive firms can expedite their progress towards delivering more intelligent and interconnected vehicle experiences. Furthermore, this innovation positions them to better meet future consumer demands in a rapidly evolving automotive landscape.
  • 8
    AWS Virtual Waiting Room Reviews & Ratings

    AWS Virtual Waiting Room

    Amazon

    Enhance site performance and user satisfaction during peak traffic.
    This strategy effectively handles the surge of user requests to your website during busy traffic times. It creates a cloud-based infrastructure that reroutes incoming traffic temporarily while providing options to customize the addition of a virtual waiting room. This waiting area acts as a buffer for visitors, permitting them to wait until there's enough space for them to access the site. Instances that may prompt its activation include the release of concert or sporting event tickets, flash sales such as Black Friday, significant product launches with extensive promotional campaigns, online classes and testing sessions, the availability of medical appointments, or the rollout of a new service that requires user registration and payment. Upon entering the waiting room, users are assigned a queue number to secure their position, and they can only exit to visit the website when it is their turn. This mechanism not only improves user satisfaction by minimizing delays but also plays a crucial role in preserving website performance during high-demand periods, ultimately benefiting both users and site administrators alike.
  • 9
    Cloud Assessor Reviews & Ratings

    Cloud Assessor

    Cloud Assessor

    Streamline AWS audits, enhance security, and educate your team.
    Our solution streamlines the process of conducting AWS cloud audits, offering support for more than 60 AWS services by automatically detecting misconfigurations and security vulnerabilities in your cloud environment, while also providing insights into any deviations from established AWS best practices. Functioning as a standalone CloudFormation stack within your AWS account, it guarantees that you retain full ownership of your data inside your VPC. By implementing this application, you can enable ongoing monitoring and protection of your AWS infrastructure while also educating your team about best practices in cloud management. Every alert generated is thoroughly documented, referencing official AWS resources, AWS CLI commands, and pertinent Re:Invent presentations found on AWS's YouTube channel. Furthermore, Cloud Assessor not only bolsters your security posture but also serves as an educational tool for your team, enhancing their understanding of AWS best practices, while ensuring that your data and configurations remain exclusively within your control and do not exit your VPC. This design eliminates any risk of data compromise, allowing you to harness robust tools for effective cloud governance without concern. Ultimately, this empowers your organization to maintain high security standards and compliance in the ever-evolving landscape of cloud technology.
  • 10
    Procyon Reviews & Ratings

    Procyon

    Procyon

    Unlock secure cloud access effortlessly, without passwords needed!
    Experience effortless and secure entry to your cloud infrastructure without relying on passwords. Embrace the power of passwordless authentication across leading cloud platforms and a variety of cloud resources, seamlessly integrating with AWS, GCP, Azure, and a range of other cloud-native solutions. Protect against excessive access by utilizing just-in-time permissions tailored for developers. DevOps teams can conveniently request access to cloud resources through a system that grants 'just enough privileges,' ensuring their permissions are both time-sensitive and appropriate. This configuration effectively alleviates the productivity hurdles associated with depending solely on a centralized administrator. You have the flexibility to set approval policies based on various criteria, and you will gain access to a detailed catalog of both utilized and unutilized resources. Reduce the dangers of credential sprawl and mitigate the fears linked to credential theft. Developers can obtain passwordless access to cloud resources through advanced Trusted Platform Module (TPM) technology, which enhances security. Furthermore, you can identify potential weaknesses today with our free assessment tool, which provides insights into how Procyon can resolve these vulnerabilities swiftly. By harnessing TPM, robust identification of users and their devices is ensured, significantly improving overall security. This cutting-edge method not only simplifies access but also greatly strengthens your cloud security framework, paving the way for a more secure and efficient cloud environment. As a result, organizations can focus on innovation while maintaining a high level of security.
  • 11
    Offensive 360 Reviews & Ratings

    Offensive 360

    Offensive 360

    Unmatched security innovation, affordable protection for every organization.
    After years of focused innovation and development, we have successfully launched a comprehensive product that is affordable for organizations of all sizes while maintaining unmatched quality in the SAST sector. Our all-in-one solution is crafted to be easily accessible without sacrificing the high standards we have established. O’360 conducts a thorough examination of source code, efficiently identifying vulnerabilities within the open-source components that your project relies on. In addition, it includes malware and licensing assessments, along with Infrastructure as Code (IaC) evaluations, all driven by our sophisticated "brain" technology. Unlike many of our competitors, Offensive 360 is developed by cybersecurity professionals rather than investors, which ensures that our priorities are centered on security rather than financial gain. Our unlimited model distinguishes us from others; we do not charge based on the number of lines of code, projects, or users, allowing for greater flexibility. Additionally, O360 is equipped to uncover vulnerabilities that are frequently missed by traditional SAST tools, making it an essential resource for meeting the security requirements of any organization. This robust capability renders our solution not only practical but also indispensable in the evolving landscape of cybersecurity today, where threats are constantly emerging and evolving.
  • 12
    DROPS Reviews & Ratings

    DROPS

    DROPS

    Streamlined deployment, enhanced collaboration, and reliable application delivery.
    DROPS is an advanced release management tool designed to improve, secure, and unify the application deployment process across various infrastructures such as data centers, hybrid models, and multi-cloud systems. It supports multiple platforms, seamlessly integrates with various CI/CD pipelines, and offers both agent-based and agentless operation modes. With features that include thorough release management, automated infrastructure provisioning, and 24/7 availability, DROPS aims to streamline deployment processes while maintaining consistent and reliable delivery. This flexible solution is capable of managing both legacy and modern applications, catering to the diverse needs of businesses. Users can opt for agent-based or agentless methods without the burden of agent installation or maintenance. If agents are needed, DROPS will automatically handle their provisioning to fit your specific setup. The intuitive web console allows for planning and managing application deployments without requiring extensive scripting knowledge, enhancing collaboration among stakeholders and technical teams, which ultimately boosts overall project efficiency. Consequently, DROPS not only simplifies the deployment process but also significantly improves communication and coordination throughout the software development lifecycle, leading to more successful project outcomes.
  • 13
    AudioCodes Mediant Cloud SBC Reviews & Ratings

    AudioCodes Mediant Cloud SBC

    AudioCodes

    Scalable, secure communication solutions for modern virtual environments.
    AudioCodes introduces the Mediant Cloud Edition (CE), a cloud-native Session Border Controller (SBC) designed to provide scalable, secure, and cost-effective voice and video communication solutions in virtualized environments. With its automatic elasticity feature, the Mediant CE can dynamically adjust resources based on real-time traffic demands, ensuring optimal performance without requiring manual intervention. Built on the same core code as AudioCodes' physical SBCs, it boasts extensive SIP interoperability, advanced media processing functions such as transcoding, and robust security protocols. Its microservices architecture, coupled with a scalable media cluster, facilitates the swift and economical launch of new communication services. Additionally, the installation process is streamlined through native tools like AWS CloudFormation, which integrates effortlessly into existing automation and DevOps frameworks, thereby improving operational efficiency and adaptability to market shifts. As a result, the Mediant CE stands out as an exceptional choice for organizations aiming to enhance and modernize their communication systems, ensuring they remain competitive in a rapidly evolving technological landscape.
  • 14
    Galgos AI Reviews & Ratings

    Galgos AI

    Galgos AI

    Streamline your cloud infrastructure with intelligent, compliant automation.
    Galgos AI acts as a smart DevOps companion tailored for cloud infrastructure, enabling the creation of secure and compliant infrastructure-as-code through natural language prompts. This sophisticated tool integrates AI-enhanced DevOps best practices to produce Terraform, CloudFormation, and Kubernetes manifests that align with your organization's compliance and security standards. By simply requesting resources in plain English—covering areas such as networking, identity management, encryption, logging, and monitoring—you can greatly expedite the cloud provisioning process, while also utilizing built-in modules designed for cost-effectiveness and compliance with established standards like CIS, NIST, and PCI DSS. Additionally, it offers an updated policy library, performs real-time validation with remediation suggestions, and includes drift detection accompanied by automatic corrections. Users can conveniently preview, version-control, and merge the generated code into existing CI/CD pipelines through API or CLI, compatible with platforms such as GitHub Actions, Jenkins, and HashiCorp Vault. In essence, this groundbreaking solution not only boosts operational productivity but also guarantees that your cloud infrastructure remains strong and compliant amid the rapidly changing technological environment, thus providing peace of mind for organizations navigating these complexities.
  • 15
    Mondoo Reviews & Ratings

    Mondoo

    Mondoo

    "Transform security management with comprehensive visibility and remediation."
    Mondoo functions as an all-encompassing platform dedicated to security and compliance, with the goal of significantly reducing key vulnerabilities in organizations by integrating thorough asset visibility, risk analysis, and proactive measures for remediation. It maintains an extensive inventory of various asset types, such as cloud services, on-premises systems, SaaS applications, endpoints, network devices, and developer pipelines, while continuously assessing their configurations, vulnerabilities, and relationships. By taking into account business relevance—like the significance of an asset, possible exploitation risks, and deviations from set policies—it effectively scores and highlights the most urgent threats. Users are given the choice for guided remediation using pre-tested code snippets and playbooks, or they may opt for automated remediation through orchestration pipelines, which include features for tracking, ticket generation, and verification. Furthermore, Mondoo supports the integration of third-party findings, operates seamlessly with DevSecOps toolchains, including CI/CD, Infrastructure as Code (IaC), and container registries, and offers over 300 compliance frameworks and benchmark templates for a comprehensive approach to security. Its powerful features not only bolster organizational resilience but also simplify compliance processes, making it an essential tool for tackling modern security challenges while ensuring that businesses can maintain a robust security posture. Ultimately, Mondoo stands out as a vital resource in navigating the complexities of today's security landscape.
  • 16
    Adaptive6 Reviews & Ratings

    Adaptive6

    Adaptive6

    Maximize cloud efficiency, minimize costs, streamline your resources.
    Adaptive6 stands out as a cutting-edge solution aimed at managing and optimizing cloud costs, helping organizations discover, address, and prevent waste within their cloud systems and development methodologies. Through its persistent surveillance of multi-cloud settings, PaaS, and Infrastructure-as-Code configurations, it uncovers a variety of inefficiencies, including the often-overlooked "shadow waste" that lurks alongside more visible cost contributors. The platform provides engineers with valuable insights, AI-driven code adjustments, remediation scripts, and automated pull requests to facilitate efficient problem resolution. Additionally, it incorporates shift-left cost management strategies into CI/CD workflows, proactively identifying and mitigating inefficiencies before deployment occurs. A significant aspect of its functionality is the automation of remediation processes, which identifies resource owners and creates tickets or change requests that come with helpful technical guidance. Featuring a robust dashboard that enhances visibility, it offers suggestions for optimizing surplus cloud and Kubernetes resources, enforces policies, and includes tools that encourage accountability within teams. Adaptive6 not only enables teams to significantly reduce cloud costs but also fosters a culture of responsibility and sustainability in resource management, ultimately advancing both financial effectiveness and ethical cloud usage. Through these features, the platform paves the way for organizations to embrace more efficient cloud strategies while minimizing their environmental footprint.
  • 17
    Cloudify Reviews & Ratings

    Cloudify

    Cloudify Platform

    Streamline your CI/CD with unified, seamless orchestration solutions.
    A unified platform allows management of both public and private environments through a single CI/CD plugin that seamlessly connects to various automation toolchains. This versatile plugin is compatible with Jenkins, Kubernetes, Terraform, Cloud Formation, Azure ARM, and numerous other tools. There’s no need for installation or downloading, and you can enjoy the first thirty days at no cost. The integration extends to infrastructure orchestration tools such as AWS Cloud Formation, Azure ARM, and Ansible, providing a Service Composition Domain-Specific Language that streamlines service relationships and manages cascading workflows effectively. It also offers features like shared resources and distributed lifecycle management. Additionally, it facilitates the orchestration of cloud-native Kubernetes services across multiple clusters using technologies like OpenShift and KubeSpray, with blueprints available to automate cluster configurations and setups. By integrating with Jenkins and other CI/CD platforms, this solution serves as a comprehensive hub for all orchestration domains that can be woven into your CI/CD pipeline, enhancing efficiency and collaboration across different teams.
  • 18
    Yet Analytics Reviews & Ratings

    Yet Analytics

    Yet Analytics

    Empowering educational success through innovative data integration solutions.
    Our team members play pivotal roles within the IEEE Learning Technology Standards Committee, which empowers us to assist you in navigating the intricacies of aligning your educational framework with global best practices. The introduction of the Enterprise Learner Record standard (IEEE P2997) offers features for metadata aggregation and facilitates the cross-referencing of data across various training and educational domains. As key contributors to this initiative, we are prepared to leverage our expertise for the success of your project. We can aid you in deploying one or multiple SQL Learning Record Stores (LRSs) across a variety of settings, including cloud platforms and compact mobile devices that are as portable as a backpack. The SQL LRS utilizes a PostgreSQL database, enabling direct connections to leading business intelligence tools from the outset. Our creation of LRSPipe is informed by our extensive background in integrating intelligent tutoring systems with automated competency assertion systems through xAPI. Together, we can identify opportunities to refine the operational logic and communication processes within your learning ecosystem, ensuring that each element functions cohesively for the best possible results. By engaging in a collaborative effort, we can customize solutions that align with your unique requirements and pave the way for your educational success. Ultimately, our goal is to ensure that your learning initiatives are not only effective but also sustainable in the long run.
  • 19
    Plerion Reviews & Ratings

    Plerion

    Plerion

    Streamline cloud security, enhance collaboration, and prioritize risks.
    Plerion streamlines security in the cloud, safeguards the environment, and ensures full transparency through a unified platform. By providing a consolidated view, it enhances clarity regarding your infrastructure and fosters more effective collaboration among teams. Plerion stands out as a comprehensive solution that consolidates multiple tools into one. With Plerion's Security Graph, clients can effectively prioritize risks based on their potential impact on the business, leading to less alert fatigue and quicker threat detection and response times. The platform significantly shortens both the mean time to detect (MTTD) and mean time to respond (MTTR) by utilizing enriched, contextual data, enabling more informed and rapid decision-making. Additionally, Plerion continuously manages and monitors your security posture with an adaptable platform that evolves alongside your needs, ensuring sustained effectiveness as your organization grows. Ultimately, this empowers businesses to focus on their core objectives while maintaining robust security practices.