Security Knowledge Base

Cyscale Security Wiki

A practical security wiki built for engineering, AppSec, cloud, and compliance teams that work through finding triage, attack-path review, IAM risk, control evidence, and remediation workflows across SAST, DAST, SCA, secret scanning, IaC, container security, and CNAPP.

Platform Foundations

Application Security and Code Scanning

SAST

SAST analyzes source code, bytecode, or compiled artifacts before deployment so teams can catch insecure coding patterns earlier in the delivery pipeline.

DAST

DAST evaluates running applications from the outside to identify exploitable behavior such as injection flaws, auth issues, and exposed attack surface.

SCA

SCA identifies vulnerable and risky open-source packages, transitive dependencies, license issues, and outdated components across modern software delivery pipelines.

Secret Scanning

Secret scanning detects exposed credentials, API keys, tokens, and certificates before they become an entry point into cloud or application environments.

IaC Scanning

IaC scanning reviews Terraform, CloudFormation, Kubernetes manifests, and similar files for insecure defaults before infrastructure reaches production.

Container Scanning

Container image scanning finds vulnerable packages, malware, secrets, and misconfigurations inside build artifacts before those workloads run in production.

API Security

API security testing validates authentication, authorization, schema handling, and business-logic resilience across modern service architectures.

License Risk and SBOM

SBOM and license analysis help teams understand what software components they ship and where legal, operational, or supply-chain exposure exists.

Dependency Malware

Modern dependency attacks use typosquatting, account takeover, and malicious package updates to compromise build pipelines and production systems.

End-of-Life Software

End-of-life software increases operational and security risk because unsupported components stop receiving patches, fixes, and ecosystem support.

Operational Programs

New Section

Controls, Standards and Frameworks, and Policies

Browse the Cyscale GRC catalog to inspect major control families, mapped standards and frameworks, and policy templates. Each entry shows connector coverage, covered asset types, and the underlying query logic used by Cyscale to generate control evidence.

Compare platforms and plan next steps

Use structured comparison pages to evaluate Cyscale against Wiz, Lacework, Zscaler, Orca, AWS native tools, Google Cloud native tools, and Microsoft Azure native tools.

Cyscale Logo
Cyscale is an agentless cloud-native application protection platform (CNAPP) that automates the contextual analysis of cloud misconfigurations, vulnerabilities, access, and data, to provide an accurate and actionable assessment of risk.

Stay connected

Receive new blog posts and product updates from Cyscale

By clicking Subscribe, I agree to Cyscale’s Privacy Policy


© 2026 Cyscale Limited

LinkedIn icon
Twitter icon
Facebook icon
crunch base icon
angel icon