{"id":3462,"date":"2018-12-10T07:57:34","date_gmt":"2018-12-10T02:27:34","guid":{"rendered":"http:\/\/kalilinuxtutorials.com\/?p=3462"},"modified":"2018-12-10T07:57:34","modified_gmt":"2018-12-10T02:27:34","slug":"hayat","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/hayat\/","title":{"rendered":"Hayat &#8211; Google Cloud Platform &#038; Auditing &#038; Hardening Script"},"content":{"rendered":"<p>Hayat tool used for Google Cloud Platform Auditing &amp; Hardening Script.<\/p>\n<h2><strong>What does that mean Hayat?<\/strong><\/h2>\n<p>Well, I had a hard time finding a unique name, honestly. &#8220;Hayat&#8221; is a Turkish word which means &#8220;Life&#8221; in English and also my niece&#8217;s name. Are you ready to meet her?<\/p>\n<p>Hayat is a auditing &amp; hardening script for Google Cloud Platform services such as:<\/p>\n<ul>\n<li>Identity &amp; Access Management<\/li>\n<li>Logging and monitoring<\/li>\n<li>Networking<\/li>\n<li>Virtual Machines<\/li>\n<li>Storage<\/li>\n<li>Cloud SQL Instances<\/li>\n<li>Kubernetes Clusters<\/li>\n<\/ul>\n<p>for now.<\/p>\n<p><strong><span class=\"td_btn td_btn_sm td_3D_btn\">Also Read<\/span><a href=\"https:\/\/kalilinuxtutorials.com\/kamerka-map-cameras-shodan\/\" target=\"_blank\" rel=\"noopener\">Kamerka \u2013 Build Interactive Map Of Cameras From Shodan<\/a><\/strong><\/p>\n<h2><strong>Identity &amp; Access Management<\/strong><\/h2>\n<ul>\n<li>Ensure that corporate login credentials are used instead of Gmail accounts.<\/li>\n<li>Ensure that there are only GCP-managed service account keys for each service account.<\/li>\n<li>Ensure that ServiceAccount has no Admin privileges.<\/li>\n<li>Ensure that IAM users are not assigned Service Account User role at project level.<\/li>\n<\/ul>\n<h2><strong>Logging and Monitoring<\/strong><\/h2>\n<ul>\n<li>Ensure that sinks are configured for all Log entries.<\/li>\n<\/ul>\n<h2><strong>Networking<\/strong><\/h2>\n<ul>\n<li>Ensure the default network does not exist in a project.<\/li>\n<li>Ensure legacy networks does not exists for a project.<\/li>\n<li>Ensure that DNSSEC is enabled for Cloud DNS.<\/li>\n<li>Ensure that RSASHA1 is not used for key-signing key in Cloud DNS DNSSEC.<\/li>\n<li>Ensure that RSASHA1 is not used for zone-signing key in Cloud DNS DNSSEC.<\/li>\n<li>Ensure that RDP access is restricted from the Internet.<\/li>\n<li>Ensure Private Google Access is enabled for all subnetwork in VPC Network.<\/li>\n<li>Ensure VPC Flow logs is enabled for every subnet in VPC Network.<\/li>\n<\/ul>\n<h2><strong>Virtual Machines<\/strong><\/h2>\n<ul>\n<li>Ensure that instances are not configured to use the default service account with full access to all Cloud APIs.<\/li>\n<li>Ensure &#8220;Block Project-wide SSH keys&#8221; enabled for VM instances.<\/li>\n<li>Ensure oslogin is enabled for a Project.<\/li>\n<li>Ensure &#8216;Enable connecting to serial ports&#8217; is not enabled for VM Instance.<\/li>\n<li>Ensure that IP forwarding is not enabled on Instances.<\/li>\n<\/ul>\n<h2><strong>Storage<\/strong><\/h2>\n<ul>\n<li>Ensure that Cloud Storage bucket is not anonymously or publicly accessible.<\/li>\n<li>Ensure that logging is enabled for Cloud storage bucket.<\/li>\n<\/ul>\n<h2><strong>Cloud SQL Database Services<\/strong><\/h2>\n<ul>\n<li>Ensure that Cloud SQL database instance requires all incoming connections to use SSL.<\/li>\n<li>Ensure that Cloud SQL database Instances are not open to the world.<\/li>\n<li>Ensure that MySql database instance does not allow anyone to connect with administrative privileges.<\/li>\n<li>Ensure that MySQL Database Instance does not allows root login from any host.<\/li>\n<\/ul>\n<h2><strong>Kubernetes Engine<\/strong><\/h2>\n<ul>\n<li>Ensure Stackdriver Logging is set to Enabled on Kubernetes Engine Clusters.<\/li>\n<li>Ensure Stackdriver Monitoring is set to Enabled on Kubernetes Engine Clusters.<\/li>\n<li>Ensure Legacy Authorization is set to Disabled on Kubernetes Engine Clusters.<\/li>\n<li>Ensure Master authorized networks is set to Enabled on Kubernetes Engine Clusters.<\/li>\n<li>Ensure Kubernetes Clusters are configured with Labels.<\/li>\n<li>Ensure Kubernetes web UI \/ Dashboard is disabled.<\/li>\n<li>Ensure <code>Automatic node repair<\/code> is enabled for Kubernetes Clusters.<\/li>\n<li>Ensure Automatic node upgrades is enabled on Kubernetes Engine Clusters nodes.<\/li>\n<li>Ensure Container-Optimized OS (cos) is used for Kubernetes Engine Clusters Node image.<\/li>\n<li>Ensure Basic Authentication is disabled on Kubernetes Engine Clusters.<\/li>\n<\/ul>\n<h2><strong>Usage<\/strong><\/h2>\n<pre><strong><span style=\"color: #008000;\">git clone <a style=\"color: #008000;\" href=\"https:\/\/github.com\/DenizParlak\/Hayat.git\">https:\/\/github.com\/DenizParlak\/Hayat.git<\/a> &amp;&amp; cd Hayat &amp;&amp; chmod +x hayat.sh &amp;&amp; .\/hayat.sh<\/span><\/strong><\/pre>\n<p>You can use with specific functions, e.g if you want to scan just Kubernetes Cluster:<\/p>\n<pre><strong><span style=\"color: #008000;\">.\/hayat.sh --only-kubernetes<\/span><\/strong><\/pre>\n<h2><strong>Screenshots<\/strong><\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-3464\" src=\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/12\/Screenshots11.jpg\" alt=\"\" width=\"1983\" height=\"1637\"> <img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-3465\" src=\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/12\/Screenshots12.jpg\" alt=\"\" width=\"2119\" height=\"1685\"><\/p>\n<p><a href=\"https:\/\/github.com\/DenizParlak\/hayat#identity--access-management\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-999\" src=\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png\" alt=\"\" width=\"141\" height=\"40\"><\/a><strong><em>You can follow us on&nbsp;<a href=\"https:\/\/www.linkedin.com\/company\/gbhackers\/\">Linkedin<\/a>,&nbsp;<a href=\"https:\/\/twitter.com\/GbhackerOn\">Twitter<\/a>,&nbsp;<a href=\"https:\/\/www.facebook.com\/gbhackersadmin\">Facebook<\/a>&nbsp;for daily Cybersecurity updates also you can take the&nbsp;<a href=\"https:\/\/ethicalhackersacademy.com\/\">Best Cybersecurity courses online<\/a>&nbsp;to keep your self-updated.<\/em><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hayat tool used for Google Cloud Platform Auditing &amp; Hardening Script. What does that mean Hayat? Well, I had a hard time finding a unique name, honestly. &#8220;Hayat&#8221; is a Turkish word which means &#8220;Life&#8221; in English and also my niece&#8217;s name. Are you ready to meet her? Hayat is a auditing &amp; hardening script [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[28],"tags":[273,1376,1458,1482],"class_list":["post-3462","post","type-post","status-publish","format-standard","hentry","category-kali","tag-auditing","tag-google-cloud","tag-hardening-script","tag-hayat"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Hayat - Google Cloud Platform &amp; Auditing &amp; Hardening Script<\/title>\n<meta name=\"description\" content=\"Hayat tool used for Google Cloud Platform Auditing &amp; Hardening Script. Well, I had a hard time finding a unique name, honestly. &quot;Hayat&quot; is a Turkish word\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/hayat\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hayat - Google Cloud Platform &amp; Auditing &amp; Hardening Script\" \/>\n<meta property=\"og:description\" content=\"Hayat tool used for Google Cloud Platform Auditing &amp; Hardening Script. Well, I had a hard time finding a unique name, honestly. &quot;Hayat&quot; is a Turkish word\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/hayat\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2018-12-10T02:27:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/12\/Screenshots11.jpg\" \/>\n<meta name=\"author\" content=\"R K\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"R K\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/hayat\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/hayat\/\"},\"author\":{\"name\":\"R K\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\"},\"headline\":\"Hayat &#8211; Google Cloud Platform &#038; Auditing &#038; Hardening Script\",\"datePublished\":\"2018-12-10T02:27:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/hayat\/\"},\"wordCount\":530,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/hayat\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/12\/Screenshots11.jpg\",\"keywords\":[\"Auditing\",\"Google Cloud\",\"Hardening Script\",\"Hayat\"],\"articleSection\":[\"Kali Linux\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/hayat\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/hayat\/\",\"name\":\"Hayat - Google Cloud Platform & Auditing & Hardening Script\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/hayat\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/hayat\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/12\/Screenshots11.jpg\",\"datePublished\":\"2018-12-10T02:27:34+00:00\",\"description\":\"Hayat tool used for Google Cloud Platform Auditing & Hardening Script. Well, I had a hard time finding a unique name, honestly. \\\"Hayat\\\" is a Turkish word\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/hayat\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/hayat\/#primaryimage\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/12\/Screenshots11.jpg\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/12\/Screenshots11.jpg\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\",\"name\":\"R K\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"caption\":\"R K\"},\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hayat - Google Cloud Platform & Auditing & Hardening Script","description":"Hayat tool used for Google Cloud Platform Auditing & Hardening Script. Well, I had a hard time finding a unique name, honestly. \"Hayat\" is a Turkish word","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/hayat\/","og_locale":"en_US","og_type":"article","og_title":"Hayat - Google Cloud Platform & Auditing & Hardening Script","og_description":"Hayat tool used for Google Cloud Platform Auditing & Hardening Script. Well, I had a hard time finding a unique name, honestly. \"Hayat\" is a Turkish word","og_url":"https:\/\/kalilinuxtutorials.com\/hayat\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2018-12-10T02:27:34+00:00","og_image":[{"url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/12\/Screenshots11.jpg","type":"","width":"","height":""}],"author":"R K","twitter_card":"summary_large_image","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"R K","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/hayat\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/hayat\/"},"author":{"name":"R K","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad"},"headline":"Hayat &#8211; Google Cloud Platform &#038; Auditing &#038; Hardening Script","datePublished":"2018-12-10T02:27:34+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/hayat\/"},"wordCount":530,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/hayat\/#primaryimage"},"thumbnailUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/12\/Screenshots11.jpg","keywords":["Auditing","Google Cloud","Hardening Script","Hayat"],"articleSection":["Kali Linux"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/hayat\/","url":"https:\/\/kalilinuxtutorials.com\/hayat\/","name":"Hayat - Google Cloud Platform & Auditing & Hardening Script","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/hayat\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/hayat\/#primaryimage"},"thumbnailUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/12\/Screenshots11.jpg","datePublished":"2018-12-10T02:27:34+00:00","description":"Hayat tool used for Google Cloud Platform Auditing & Hardening Script. Well, I had a hard time finding a unique name, honestly. \"Hayat\" is a Turkish word","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/hayat\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/hayat\/#primaryimage","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/12\/Screenshots11.jpg","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/12\/Screenshots11.jpg"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad","name":"R K","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","caption":"R K"},"url":"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":5839,"url":"https:\/\/kalilinuxtutorials.com\/jshielder-hardening-script\/","url_meta":{"origin":3462,"position":0},"title":"JShielder : Hardening Script for Linux Servers\/ Secure LAMP-LEMP Deployer\/ CIS Benchmark G","author":"R K","date":"July 18, 2019","format":false,"excerpt":"JSHielder is an Open Source Bash Script developed to help SysAdmin and developers secure there Linux Servers in which they will be deploying any web application or services. This tool automates the process of installing all the necessary packages to host a web application and Hardening a Linux server with\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":6642,"url":"https:\/\/kalilinuxtutorials.com\/scout-suite-multi-cloud-security-auditing-tool\/","url_meta":{"origin":3462,"position":1},"title":"Scout Suite : Multi-Cloud Security Auditing Tool","author":"R K","date":"September 28, 2019","format":false,"excerpt":"Scout Suite is an open source multi-cloud security-auditing tool, which enables security posture assessment of cloud environments. Using the APIs exposed by cloud providers, Scout Suite gathers configuration data for manual inspection and highlights risk areas. Rather than going through dozens of pages on the web consoles, Scout Suite presents\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":36638,"url":"https:\/\/kalilinuxtutorials.com\/azure-secops\/","url_meta":{"origin":3462,"position":2},"title":"Azure-SecOps : Streamlining Security Operations In The Cloud","author":"Varshini","date":"February 24, 2025","format":false,"excerpt":"Azure-SecOps is a critical framework that integrates security tools and operational processes to ensure robust threat detection, mitigation, and compliance in Microsoft's Azure ecosystem. By leveraging a combination of advanced tools and automation, Azure-SecOps bridges the gap between security and operations, enabling organizations to maintain a secure and compliant cloud\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/Azure-SecOps.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/Azure-SecOps.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/Azure-SecOps.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/Azure-SecOps.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/Azure-SecOps.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/Azure-SecOps.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":10925,"url":"https:\/\/kalilinuxtutorials.com\/lynis\/","url_meta":{"origin":3462,"position":3},"title":"Lynis 3.0.0 &#8211; Security Auditing Tool for Unix\/Linux Systems","author":"R K","date":"July 16, 2020","format":false,"excerpt":"We are excited to announce this major release of auditing tool Lynis. Several big changes have been made to core functions of Lynis. These changes are the next of simplification improvements we made. There is a risk of breaking your existing configuration.Lynis is an open source security auditing tool. Used\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":32400,"url":"https:\/\/kalilinuxtutorials.com\/awesome-cybersecurity-blue-team\/","url_meta":{"origin":3462,"position":4},"title":"Awesome Cybersecurity Blue Team &#8211; Empowering Defenses With Comprehensive Strategies And Tools","author":"Varshini","date":"March 20, 2024","format":false,"excerpt":"Cybersecurity blue teams\u00a0are groups of individuals who identify security flaws in information technology systems, verify the effectiveness of security measures, and monitor the systems to ensure that implemented defensive measures remain effective in the future. While not exclusive, this list is heavily biased towards\u00a0Free Software\u00a0projects and against proprietary products or\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg_vAZXx9IkojNiZmbBYfqpnJkwCzpsvSGCYS99VLeetG2QxpRhy_6zgDZPbM_NDb_U_lvDk8CqG7YB1Xuov58VfWX82o0ROpVxcp5rESPiKgTSdPuKP-u4mL2f1tX4sLWoZ9fROku1iJpj6_V0nGu2Oo7B7m13exXQVVe7jjpZhJ2j3jQ_Xqw4k8inIMXd\/s16000\/Awesome%20Cybersecurity%20Blue%20Team.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg_vAZXx9IkojNiZmbBYfqpnJkwCzpsvSGCYS99VLeetG2QxpRhy_6zgDZPbM_NDb_U_lvDk8CqG7YB1Xuov58VfWX82o0ROpVxcp5rESPiKgTSdPuKP-u4mL2f1tX4sLWoZ9fROku1iJpj6_V0nGu2Oo7B7m13exXQVVe7jjpZhJ2j3jQ_Xqw4k8inIMXd\/s16000\/Awesome%20Cybersecurity%20Blue%20Team.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg_vAZXx9IkojNiZmbBYfqpnJkwCzpsvSGCYS99VLeetG2QxpRhy_6zgDZPbM_NDb_U_lvDk8CqG7YB1Xuov58VfWX82o0ROpVxcp5rESPiKgTSdPuKP-u4mL2f1tX4sLWoZ9fROku1iJpj6_V0nGu2Oo7B7m13exXQVVe7jjpZhJ2j3jQ_Xqw4k8inIMXd\/s16000\/Awesome%20Cybersecurity%20Blue%20Team.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg_vAZXx9IkojNiZmbBYfqpnJkwCzpsvSGCYS99VLeetG2QxpRhy_6zgDZPbM_NDb_U_lvDk8CqG7YB1Xuov58VfWX82o0ROpVxcp5rESPiKgTSdPuKP-u4mL2f1tX4sLWoZ9fROku1iJpj6_V0nGu2Oo7B7m13exXQVVe7jjpZhJ2j3jQ_Xqw4k8inIMXd\/s16000\/Awesome%20Cybersecurity%20Blue%20Team.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg_vAZXx9IkojNiZmbBYfqpnJkwCzpsvSGCYS99VLeetG2QxpRhy_6zgDZPbM_NDb_U_lvDk8CqG7YB1Xuov58VfWX82o0ROpVxcp5rESPiKgTSdPuKP-u4mL2f1tX4sLWoZ9fROku1iJpj6_V0nGu2Oo7B7m13exXQVVe7jjpZhJ2j3jQ_Xqw4k8inIMXd\/s16000\/Awesome%20Cybersecurity%20Blue%20Team.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg_vAZXx9IkojNiZmbBYfqpnJkwCzpsvSGCYS99VLeetG2QxpRhy_6zgDZPbM_NDb_U_lvDk8CqG7YB1Xuov58VfWX82o0ROpVxcp5rESPiKgTSdPuKP-u4mL2f1tX4sLWoZ9fROku1iJpj6_V0nGu2Oo7B7m13exXQVVe7jjpZhJ2j3jQ_Xqw4k8inIMXd\/s16000\/Awesome%20Cybersecurity%20Blue%20Team.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":5549,"url":"https:\/\/kalilinuxtutorials.com\/lynis-security-auditing-tool-2\/","url_meta":{"origin":3462,"position":5},"title":"Lynis : Security Auditing Tool for Unix\/Linux Systems","author":"R K","date":"June 30, 2019","format":false,"excerpt":"Lynis is a security auditing tool for UNIX derivatives like Linux, macOS, BSD, Solaris, AIX, and others. It performs an in-depth security scan. Software packages is available by clicking here. Requirements Shell and basic utilities Permissions Normal user or preferable root permissions Installation Installation via package Installing the tool via\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/3462","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=3462"}],"version-history":[{"count":0,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/3462\/revisions"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=3462"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=3462"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=3462"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}