List of AWS CloudFormation Integrations

This is a list of platforms and tools that integrate with AWS CloudFormation. This list is updated as of April 2025.

  • 1
    Userify Reviews & Ratings

    Userify

    Userify

    Streamline SSH key management with robust security and compliance.
    Efficiently oversee SSH keys for your team across diverse cloud platforms and global locations by leveraging tools such as Ansible, Chef, Puppet, Salt, CloudFormation, Terraform, or custom scripts. Userify operates smoothly across multiple cloud services that are widely distributed and can handle high-latency networks. It incorporates advanced security protocols, including Curve 25519 encryption and bcrypt hashing, ensuring adherence to PCI-DSS and HIPAA regulations. In addition, Userify has achieved AICPA SOC-2 Type 1 certification and is relied upon by over 3,500 organizations around the globe. The solution's passwordless SSH key login feature not only enhances security but also facilitates user convenience. Notably, it stands out as the only key management tool engineered to work effectively over the open Internet. Userify makes the removal of departing administrators incredibly straightforward, reducing the de-provisioning process to a single click. It also aids in fulfilling PCI-DSS Requirement 8, which is essential for protecting personally identifiable information (PII) while completely phasing out the default ec2-user account. Additionally, Userify supports compliance with the HIPAA Security Rule, thereby safeguarding essential healthcare systems and protected health information (PHI) by limiting internal access and control. This comprehensive approach ensures that organizations can maintain high security standards while efficiently managing their SSH key infrastructure.
  • 2
    discrimiNAT Firewall Reviews & Ratings

    discrimiNAT Firewall

    Chaser Systems

    Effortless egress filtering for secure, scalable cloud networking.
    The discrimiNAT addresses the challenge of not being able to specify hostnames or fully qualified domain names (FQDNs) in Google Cloud Firewall Rules and AWS Security Groups, facilitating efficient and scalable egress filtering. Utilizing a Deep Packet Inspection engine, it oversees and restricts traffic without the need for decryption, serving as a highly available NAT Instance at the egress point of your VPC network. Designed with user-friendliness in mind, you only need to input the allowed destination FQDNs in your applications' outbound rules, and the firewall takes care of the rest without any hassle. To appreciate its ease of use, feel free to watch the concise video demonstrations provided. Our solution accommodates everything from fully integrated multi-zone network configurations that can be launched with a single click, complete with practical defaults, to customizable instance setups, giving users the flexibility to adapt their networking arrangements as desired. Furthermore, we supply an extensive array of ready-to-use templates in our CloudFormation library for AWS and as a Deployment Manager template for Google Cloud, ensuring that users can quickly implement robust and effective security solutions. This approach not only enhances security but also streamlines the process of managing network configurations across different platforms.
  • 3
    AWS Connected Vehicle Solution Reviews & Ratings

    AWS Connected Vehicle Solution

    Amazon

    Empower automotive innovation with seamless, secure cloud connectivity.
    Amazon Web Services (AWS) enables automotive producers and their suppliers to develop serverless Internet of Things (IoT) applications that gather, process, analyze, and react to data from connected vehicles, all while removing the burden of infrastructure management. Through AWS IoT, users can safely connect vehicles and devices to the AWS Cloud, resulting in reduced latency and lower expenses. To enhance the development and launching of cutting-edge connected vehicle services, AWS offers a connected vehicle solution that guarantees secure access to the AWS Cloud and provides a structure for incorporating AWS IoT and AWS Greengrass within the Automotive Grade Linux (AGL) software infrastructure. This solution includes local processing capabilities in vehicles, sophisticated event rules, and various options for data management and storage. The framework aims to simplify the creation of connected vehicle services, empowering developers to focus on further improving the features of their solutions. By utilizing these resources, automotive firms can expedite their progress towards delivering more intelligent and interconnected vehicle experiences. Furthermore, this innovation positions them to better meet future consumer demands in a rapidly evolving automotive landscape.
  • 4
    AWS Virtual Waiting Room Reviews & Ratings

    AWS Virtual Waiting Room

    Amazon

    Enhance site performance and user satisfaction during peak traffic.
    This strategy effectively handles the surge of user requests to your website during busy traffic times. It creates a cloud-based infrastructure that reroutes incoming traffic temporarily while providing options to customize the addition of a virtual waiting room. This waiting area acts as a buffer for visitors, permitting them to wait until there's enough space for them to access the site. Instances that may prompt its activation include the release of concert or sporting event tickets, flash sales such as Black Friday, significant product launches with extensive promotional campaigns, online classes and testing sessions, the availability of medical appointments, or the rollout of a new service that requires user registration and payment. Upon entering the waiting room, users are assigned a queue number to secure their position, and they can only exit to visit the website when it is their turn. This mechanism not only improves user satisfaction by minimizing delays but also plays a crucial role in preserving website performance during high-demand periods, ultimately benefiting both users and site administrators alike.
  • 5
    Opsera Reviews & Ratings

    Opsera

    Opsera

    Empower your team with seamless, customized CI/CD solutions.
    Choose the tools that align perfectly with your requirements, and we will take care of the rest. Design a customized CI/CD stack that meets your organization's goals without concerns about vendor lock-in. By removing the necessity for manual scripts and intricate toolchain automation, your engineers can focus on core business functions. Our pipeline workflows embrace a declarative methodology, which allows you to emphasize critical tasks rather than the techniques needed to complete them, addressing components such as software builds, security evaluations, unit tests, and deployment procedures. With the integration of Blueprints, you can easily diagnose issues directly within Opsera, aided by comprehensive console output for each stage of your pipeline's performance. Obtain a complete perspective on your CI/CD process with in-depth software delivery analytics that monitor metrics like Lead Time, Change Failure Rate, Deployment Frequency, and Time to Restore. Moreover, enjoy the advantages of contextualized logs that enable faster problem-solving while improving auditing and compliance practices, ensuring your operations stay effective and transparent. This efficient strategy not only fosters enhanced productivity but also encourages teams to explore innovative solutions without constraints, ultimately driving greater success for your organization.
  • 6
    Cloud Assessor Reviews & Ratings

    Cloud Assessor

    Cloud Assessor

    Streamline AWS audits, enhance security, and educate your team.
    Our solution streamlines the process of conducting AWS cloud audits, offering support for more than 60 AWS services by automatically detecting misconfigurations and security vulnerabilities in your cloud environment, while also providing insights into any deviations from established AWS best practices. Functioning as a standalone CloudFormation stack within your AWS account, it guarantees that you retain full ownership of your data inside your VPC. By implementing this application, you can enable ongoing monitoring and protection of your AWS infrastructure while also educating your team about best practices in cloud management. Every alert generated is thoroughly documented, referencing official AWS resources, AWS CLI commands, and pertinent Re:Invent presentations found on AWS's YouTube channel. Furthermore, Cloud Assessor not only bolsters your security posture but also serves as an educational tool for your team, enhancing their understanding of AWS best practices, while ensuring that your data and configurations remain exclusively within your control and do not exit your VPC. This design eliminates any risk of data compromise, allowing you to harness robust tools for effective cloud governance without concern. Ultimately, this empowers your organization to maintain high security standards and compliance in the ever-evolving landscape of cloud technology.
  • 7
    Procyon Reviews & Ratings

    Procyon

    Procyon

    Unlock secure cloud access effortlessly, without passwords needed!
    Experience effortless and secure entry to your cloud infrastructure without relying on passwords. Embrace the power of passwordless authentication across leading cloud platforms and a variety of cloud resources, seamlessly integrating with AWS, GCP, Azure, and a range of other cloud-native solutions. Protect against excessive access by utilizing just-in-time permissions tailored for developers. DevOps teams can conveniently request access to cloud resources through a system that grants 'just enough privileges,' ensuring their permissions are both time-sensitive and appropriate. This configuration effectively alleviates the productivity hurdles associated with depending solely on a centralized administrator. You have the flexibility to set approval policies based on various criteria, and you will gain access to a detailed catalog of both utilized and unutilized resources. Reduce the dangers of credential sprawl and mitigate the fears linked to credential theft. Developers can obtain passwordless access to cloud resources through advanced Trusted Platform Module (TPM) technology, which enhances security. Furthermore, you can identify potential weaknesses today with our free assessment tool, which provides insights into how Procyon can resolve these vulnerabilities swiftly. By harnessing TPM, robust identification of users and their devices is ensured, significantly improving overall security. This cutting-edge method not only simplifies access but also greatly strengthens your cloud security framework, paving the way for a more secure and efficient cloud environment. As a result, organizations can focus on innovation while maintaining a high level of security.
  • 8
    Offensive 360 Reviews & Ratings

    Offensive 360

    Offensive 360

    Unmatched security innovation, affordable protection for every organization.
    After years of focused innovation and development, we have successfully launched a comprehensive product that is affordable for organizations of all sizes while maintaining unmatched quality in the SAST sector. Our all-in-one solution is crafted to be easily accessible without sacrificing the high standards we have established. O’360 conducts a thorough examination of source code, efficiently identifying vulnerabilities within the open-source components that your project relies on. In addition, it includes malware and licensing assessments, along with Infrastructure as Code (IaC) evaluations, all driven by our sophisticated "brain" technology. Unlike many of our competitors, Offensive 360 is developed by cybersecurity professionals rather than investors, which ensures that our priorities are centered on security rather than financial gain. Our unlimited model distinguishes us from others; we do not charge based on the number of lines of code, projects, or users, allowing for greater flexibility. Additionally, O360 is equipped to uncover vulnerabilities that are frequently missed by traditional SAST tools, making it an essential resource for meeting the security requirements of any organization. This robust capability renders our solution not only practical but also indispensable in the evolving landscape of cybersecurity today, where threats are constantly emerging and evolving.
  • 9
    DROPS Reviews & Ratings

    DROPS

    DROPS

    Streamlined deployment, enhanced collaboration, and reliable application delivery.
    DROPS is an advanced release management tool designed to improve, secure, and unify the application deployment process across various infrastructures such as data centers, hybrid models, and multi-cloud systems. It supports multiple platforms, seamlessly integrates with various CI/CD pipelines, and offers both agent-based and agentless operation modes. With features that include thorough release management, automated infrastructure provisioning, and 24/7 availability, DROPS aims to streamline deployment processes while maintaining consistent and reliable delivery. This flexible solution is capable of managing both legacy and modern applications, catering to the diverse needs of businesses. Users can opt for agent-based or agentless methods without the burden of agent installation or maintenance. If agents are needed, DROPS will automatically handle their provisioning to fit your specific setup. The intuitive web console allows for planning and managing application deployments without requiring extensive scripting knowledge, enhancing collaboration among stakeholders and technical teams, which ultimately boosts overall project efficiency. Consequently, DROPS not only simplifies the deployment process but also significantly improves communication and coordination throughout the software development lifecycle, leading to more successful project outcomes.
  • 10
    Cloudify Reviews & Ratings

    Cloudify

    Cloudify Platform

    Streamline your CI/CD with unified, seamless orchestration solutions.
    A unified platform allows management of both public and private environments through a single CI/CD plugin that seamlessly connects to various automation toolchains. This versatile plugin is compatible with Jenkins, Kubernetes, Terraform, Cloud Formation, Azure ARM, and numerous other tools. There’s no need for installation or downloading, and you can enjoy the first thirty days at no cost. The integration extends to infrastructure orchestration tools such as AWS Cloud Formation, Azure ARM, and Ansible, providing a Service Composition Domain-Specific Language that streamlines service relationships and manages cascading workflows effectively. It also offers features like shared resources and distributed lifecycle management. Additionally, it facilitates the orchestration of cloud-native Kubernetes services across multiple clusters using technologies like OpenShift and KubeSpray, with blueprints available to automate cluster configurations and setups. By integrating with Jenkins and other CI/CD platforms, this solution serves as a comprehensive hub for all orchestration domains that can be woven into your CI/CD pipeline, enhancing efficiency and collaboration across different teams.
  • 11
    Yet Analytics Reviews & Ratings

    Yet Analytics

    Yet Analytics

    Empowering educational success through innovative data integration solutions.
    Our team members play pivotal roles within the IEEE Learning Technology Standards Committee, which empowers us to assist you in navigating the intricacies of aligning your educational framework with global best practices. The introduction of the Enterprise Learner Record standard (IEEE P2997) offers features for metadata aggregation and facilitates the cross-referencing of data across various training and educational domains. As key contributors to this initiative, we are prepared to leverage our expertise for the success of your project. We can aid you in deploying one or multiple SQL Learning Record Stores (LRSs) across a variety of settings, including cloud platforms and compact mobile devices that are as portable as a backpack. The SQL LRS utilizes a PostgreSQL database, enabling direct connections to leading business intelligence tools from the outset. Our creation of LRSPipe is informed by our extensive background in integrating intelligent tutoring systems with automated competency assertion systems through xAPI. Together, we can identify opportunities to refine the operational logic and communication processes within your learning ecosystem, ensuring that each element functions cohesively for the best possible results. By engaging in a collaborative effort, we can customize solutions that align with your unique requirements and pave the way for your educational success. Ultimately, our goal is to ensure that your learning initiatives are not only effective but also sustainable in the long run.
  • 12
    Plerion Reviews & Ratings

    Plerion

    Plerion

    Streamline cloud security, enhance collaboration, and prioritize risks.
    Plerion streamlines security in the cloud, safeguards the environment, and ensures full transparency through a unified platform. By providing a consolidated view, it enhances clarity regarding your infrastructure and fosters more effective collaboration among teams. Plerion stands out as a comprehensive solution that consolidates multiple tools into one. With Plerion's Security Graph, clients can effectively prioritize risks based on their potential impact on the business, leading to less alert fatigue and quicker threat detection and response times. The platform significantly shortens both the mean time to detect (MTTD) and mean time to respond (MTTR) by utilizing enriched, contextual data, enabling more informed and rapid decision-making. Additionally, Plerion continuously manages and monitors your security posture with an adaptable platform that evolves alongside your needs, ensuring sustained effectiveness as your organization grows. Ultimately, this empowers businesses to focus on their core objectives while maintaining robust security practices.