Cloud security: IaC and runtime scanning

Jit's IaC and cloud runtime scanners analyze your cloud infrastructure in different ways to surface security misconfigurations like over privileged containers, publicly exposed cloud storage instances, and many more.

Detect cloud infrastructure security misconfigurations in IaC files

IaC Security Scanning
Scan your IaC files written in Terraform, Pulumi, CloudFormation, and AWS CDK for cloud security misconfigurations.

Scan Kubernetes and serverless configuration files
Scan your Kubernetes and serverless YAMLs for security misconfigurations.


Detect cloud infrastructure security misconfigurations in runtime

Jit Cloud Security Posture Management (CSPM)
Scan your AWS, GCP, and Azure cloud infrastructure in runtime for security misconfigurations.

AWS MFA Check
Verify that the users of your AWS accounts have enabled MFA.

Import AWS Security Hub Findings
Unify security findings from AWS Security Hub alongside Jit-detected findings.