<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Vishnu Ajith</title>
    <description>The latest articles on DEV Community by Vishnu Ajith (@vishnu_ajith_98100c5d1c03).</description>
    <link>https://dev.to/vishnu_ajith_98100c5d1c03</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3934846%2F6c146353-384c-4382-9f73-7ad45a455544.png</url>
      <title>DEV Community: Vishnu Ajith</title>
      <link>https://dev.to/vishnu_ajith_98100c5d1c03</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/vishnu_ajith_98100c5d1c03"/>
    <language>en</language>
    <item>
      <title>We built a free open source alternative to Wiz for Azure — here is how it works</title>
      <dc:creator>Vishnu Ajith</dc:creator>
      <pubDate>Sat, 16 May 2026 12:24:05 +0000</pubDate>
      <link>https://dev.to/vishnu_ajith_98100c5d1c03/we-built-a-free-open-source-alternative-to-wiz-for-azure-here-is-how-it-works-49oo</link>
      <guid>https://dev.to/vishnu_ajith_98100c5d1c03/we-built-a-free-open-source-alternative-to-wiz-for-azure-here-is-how-it-works-49oo</guid>
      <description>&lt;p&gt;Enterprise cloud security tools like Wiz, Prisma Cloud, and &lt;br&gt;
Microsoft Defender for Cloud cost upwards of $500,000 per year. &lt;br&gt;
Most organisations running on Azure simply cannot afford them.&lt;/p&gt;

&lt;p&gt;So we built OpenShield — a free, open source Cloud Security &lt;br&gt;
Posture Management (CSPM) platform for Azure.&lt;/p&gt;
&lt;h2&gt;
  
  
  What is OpenShield
&lt;/h2&gt;

&lt;p&gt;OpenShield scans your Azure subscription for misconfigurations, &lt;br&gt;
maps every finding to compliance frameworks, and ships an &lt;br&gt;
automated remediation playbook for every single rule.&lt;/p&gt;

&lt;p&gt;It is built in Python, MIT licensed, and completely free.&lt;/p&gt;

&lt;p&gt;github.com/openshield-org/openshield&lt;/p&gt;
&lt;h2&gt;
  
  
  What it detects
&lt;/h2&gt;

&lt;p&gt;OpenShield currently has 20+ scan rules across six categories:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Storage - public blob access, missing lifecycle policies, 
disabled diagnostic logging&lt;/li&gt;
&lt;li&gt;Network — open SSH/RDP, missing NSGs, no DDoS protection, 
WAF disabled, VPN using IKEv1, Network Watcher not enabled&lt;/li&gt;
&lt;li&gt;Identity — overprivileged service principals, MFA not enforced, 
unrestricted guest access in Entra ID&lt;/li&gt;
&lt;li&gt;Database — public PostgreSQL access, SQL auditing disabled&lt;/li&gt;
&lt;li&gt;Compute — VMs with no NSG, unencrypted disks&lt;/li&gt;
&lt;li&gt;Key Vault — soft delete disabled, public network access, 
diagnostic logging disabled&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Every rule returns a structured finding with the resource ID, &lt;br&gt;
description, remediation steps, and a link to the playbook.&lt;/p&gt;
&lt;h2&gt;
  
  
  Compliance mapping
&lt;/h2&gt;

&lt;p&gt;Every finding is automatically mapped to four frameworks:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;CIS Azure Benchmark&lt;/li&gt;
&lt;li&gt;NIST CSF&lt;/li&gt;
&lt;li&gt;ISO 27001&lt;/li&gt;
&lt;li&gt;SOC 2 Type II&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This means you get compliance posture out of the box with &lt;br&gt;
no manual mapping required.&lt;/p&gt;
&lt;h2&gt;
  
  
  Remediation playbooks
&lt;/h2&gt;

&lt;p&gt;This is the part that makes OpenShield different from most &lt;br&gt;
open source security tools.&lt;/p&gt;

&lt;p&gt;Every scan rule ships with a hardened CLI playbook. When you &lt;br&gt;
get a finding, you do not just learn what is wrong — you get &lt;br&gt;
the exact command to fix it.&lt;/p&gt;

&lt;p&gt;Example playbook for AZ-STOR-004 (storage diagnostic logging):&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;./fix_az_stor_004.sh my-resource-group my-storage-account &lt;span class="se"&gt;\&lt;/span&gt;
  /subscriptions/.../resourceGroups/log-rg/.../logstore
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Playbooks are hardened with input validation, shell injection &lt;br&gt;
prevention, secure temp file handling, and confirmation prompts &lt;br&gt;
before making any changes.&lt;/p&gt;

&lt;h2&gt;
  
  
  Microsoft Sentinel integration
&lt;/h2&gt;

&lt;p&gt;OpenShield pushes findings directly to Microsoft Sentinel via &lt;br&gt;
Log Analytics. Four KQL detection rules are included out of &lt;br&gt;
the box:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;HIGH severity findings in the last 24 hours&lt;/li&gt;
&lt;li&gt;Misconfiguration wave detection&lt;/li&gt;
&lt;li&gt;Persistent misconfigurations&lt;/li&gt;
&lt;li&gt;New resource type critical findings&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This means you get SIEM-level visibility from a free open &lt;br&gt;
source tool.&lt;/p&gt;

&lt;h2&gt;
  
  
  The API
&lt;/h2&gt;

&lt;p&gt;A Flask REST API exposes scan results, compliance scores, and &lt;br&gt;
findings data. It is deployed on Render and live at:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://openshield-api.onrender.com" rel="noopener noreferrer"&gt;https://openshield-api.onrender.com&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Endpoints include:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;GET /api/findings — list all findings with filters&lt;/li&gt;
&lt;li&gt;GET /api/score — security posture score (0-100)&lt;/li&gt;
&lt;li&gt;GET /api/compliance/cis — CIS compliance breakdown&lt;/li&gt;
&lt;li&gt;GET /api/compliance/nist — NIST compliance breakdown&lt;/li&gt;
&lt;li&gt;POST /api/scans/trigger — trigger a live scan&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  CI pipeline
&lt;/h2&gt;

&lt;p&gt;Every pull request runs seven automated checks:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Python syntax check on all rule files&lt;/li&gt;
&lt;li&gt;Rule structure validation and RULE_ID uniqueness&lt;/li&gt;
&lt;li&gt;Hardcoded credential scan&lt;/li&gt;
&lt;li&gt;Playbook existence and bash syntax validation&lt;/li&gt;
&lt;li&gt;Compliance JSON validation across all four frameworks&lt;/li&gt;
&lt;li&gt;API syntax check&lt;/li&gt;
&lt;li&gt;Compliance vs rule cross-reference&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;This means every contribution is validated before it touches &lt;br&gt;
the main branch.&lt;/p&gt;

&lt;h2&gt;
  
  
  How to run it
&lt;/h2&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;git clone https://github.com/openshield-org/openshield
&lt;span class="nb"&gt;cd &lt;/span&gt;openshield
pip &lt;span class="nb"&gt;install&lt;/span&gt; &lt;span class="nt"&gt;-r&lt;/span&gt; requirements.txt

&lt;span class="nb"&gt;cp&lt;/span&gt; .env.example .env
&lt;span class="c"&gt;# Add your Azure credentials to .env&lt;/span&gt;

python scanner/engine.py
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;You need an Azure service principal with Reader role on your &lt;br&gt;
subscription. Full setup guide is in the repo.&lt;/p&gt;

&lt;h2&gt;
  
  
  How it was built
&lt;/h2&gt;

&lt;p&gt;OpenShield was built in public by students and engineers from &lt;br&gt;
Ulster University, Southampton Solent University, and Middlesex &lt;br&gt;
University alongside researchers at Quentangle Quantum Systems &lt;br&gt;
in London.&lt;/p&gt;

&lt;p&gt;Every contributor has a PR merged into a production grade open &lt;br&gt;
source security tool. That goes on their GitHub profile and CV &lt;br&gt;
permanently.&lt;/p&gt;

&lt;h2&gt;
  
  
  Contributing
&lt;/h2&gt;

&lt;p&gt;OpenShield is actively looking for contributors. If you want &lt;br&gt;
to add a scan rule, write a remediation playbook, or improve &lt;br&gt;
the compliance mappings, the contributing guide gets you &lt;br&gt;
making your first PR in under 30 minutes.&lt;/p&gt;

&lt;p&gt;github.com/openshield-org/openshield&lt;/p&gt;

&lt;p&gt;Good first issues are labelled and waiting. The whole team &lt;br&gt;
is available on Discord to help you through your first PR.&lt;/p&gt;

&lt;h2&gt;
  
  
  What is next
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;React dashboard with live demo URL&lt;/li&gt;
&lt;li&gt;30+ scan rules&lt;/li&gt;
&lt;li&gt;BSides Birmingham conference talk&lt;/li&gt;
&lt;li&gt;OWASP project listing&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;If you work in cloud security and want a free tool that &lt;br&gt;
actually works, or you want your first open source contribution &lt;br&gt;
on a real security project — come build with us.&lt;/p&gt;

&lt;p&gt;github.com/openshield-org/openshield&lt;/p&gt;

</description>
      <category>security</category>
      <category>azure</category>
      <category>cloud</category>
      <category>devsecops</category>
    </item>
  </channel>
</rss>
