Awesome Open Source
Awesome Open Source

GitHub Workflow Status (branch)


Open Cloud Security Posture Management, OpenCSPM, is an open-source platform for gaining deeper insight into your cloud configuration and metadata to help understand and reduce risk over time.

Who is OpenCSPM for?

  • Security teams running infrastructure in cloud environments looking to gain visibility into security risk across the entire account and track the resolution of those issues.
  • Development and Infrastructure teams looking for a set of security best-practices to follow as they develop new systems and bake security in early and often.
  • Red Teams wanting to create targeted scenarios specific to their environment with the highest impact and benefit to their Blue Team.
  • Any organization looking to establish a baseline of security issues, prioritize them by risk, and track them to closure over time.

OpenCSPM S3 Bucket Search

What does OpenCSPM do?

When deployed inside your environment, it can:

  1. collect several types of cloud configuration data on a one-time or recurring basis from your cloud account resources (VMs, Clusters, IAM, etc),
  2. parse and load that data into a graph database with deep linked relationships between resources to support advanced querying capabilities,
  3. run a customizable series of policy checks to determine conformance and record passing/failing resources on a recurring basis,
  4. create custom groupings of related policy checks that aid in tracking remediation efforts and reduction in risk over time,
  5. and provide notifications when deviations from desired baselines occur to multiple destinations.

High-level Architecture

OpenCSPM has several key components that work together:

opencspm high level architecture diagram

  1. Structured configuration and metadata is collected from the GCP Cloud Asset Inventory and Kubernetes API to a Storage Bucket or local filesystem.
  2. The data is parsed and loaded into a Graph Database with complex relationships intact.
  3. One or more customizable sets of policy checks ("control packs") are run against the parsed inventory data, and results are stored.
  4. The API/Engine serves up the user interface, handles tracking of campaigns, and notifications.

Getting Started

Ready to get going? Follow the instructions for getting started or watch the following getting started video:

OpenCSPM Quickstart

Support and Community

OpenCSPM is supported by community development. If you have found an issue, please file it using a GitHub issue.


We invite you to submit requests for new features and bug reports using a Github issue. If you would like to contribute to OpenCSPM, please review our development guide.


OpenCSPM was made open-source software by Josh Larsen and Brad Geesaman, the co-founders of Darkbit. Darkbit is a cloud-native security assessment consulting firm based in the US that helps organizations understand the risks in their cloud and Kubernetes resource configurations.

Alternative Project Comparisons
Related Awesome Lists
Top Programming Languages
Top Projects

Get A Weekly Email With Trending Projects For These Topics
No Spam. Unsubscribe easily at any time.
Ruby (222,635
Aws (38,654
Security (31,925
Cloud (29,152
Kubernetes (25,191
Team (15,967
Inventory (5,868
Gcp (5,457
Baseline (3,177
Risk (2,823
Graph Database (908
Security Audit (496
Cspm (25