What is SOC2 Compliance?
Learn SOC2 compliance essentials: protect data, build trust, and meet regulatory standards with security, availability, integrity, confidentiality, and privacy.

Joe Karlsson •
Learn SOC2 compliance essentials: protect data, build trust, and meet regulatory standards with security, availability, integrity, confidentiality, and privacy.
Joe Karlsson •
Learn about Attack Surface Management and how to build an open source ASM on top of your infrastructure data lake.
Joe Karlsson •
Explore CIEM and learn how to manage cloud access, user permissions, and compliance to ensure secure, role-based resource access. Simplify with CloudQuery’s open-source tools.
Joe Karlsson •
Understand Cloud-Native Application Protection Platforms (CNAPP) and comprehensive security for cloud-native apps against vulnerabilities, API attacks, and data breaches.
Joe Karlsson •
An infrastructure data lake is a centralized repository aimed at maintaining and managing all configuration metadata from your cloud infrastructure, such as users, computers, network, storage, and related cloud resources. Learn more about it on this page.
Joe Karlsson •
Cloud Workload Protection Platforms (CWPP) provide security for cloud workloads by managing access, detecting threats, ensuring data encryption, and addressing vulnerabilities.
Joe Karlsson •
CloudQuery introduces the JSON Flattener Transformer Integration, a new transformer integration that enables you to flatten JSON source data into separate columns at your destination.
Mariano Gappa •
CrowdStrike is now generally available on CloudQuery as a data source.
Alex Savanovich •
Find out how CloudQuery can help you get clarity from a chaotic cloud environment with a personalized conversation and demo.
We use tracking cookies to understand how you use the product and help us improve it. Please accept cookies to help us improve. You can always opt out later via the link in the footer.