Adaptive AWS Zero Trust Policy made easy: Auto-generate least-privilege policies based on user activity in real time! Accelerate the adoption of smart access control
☆75May 3, 2024Updated 2 years ago
Alternatives and similar repositories for AWSZeroTrustPolicy
Users that are interested in AWSZeroTrustPolicy are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Curating Falco rules with MITRE ATT&CK Matrix☆87Mar 7, 2024Updated 2 years ago
- ☆12Oct 17, 2023Updated 2 years ago
- ☆22Apr 17, 2023Updated 3 years ago
- A tool to automatically give AWS IAM users access to your Kubernetes cluster.☆50Apr 14, 2026Updated 3 weeks ago
- ☆18Updated this week
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- CloudDefense.ai is an automated web application security testing tool that audits your web applications by checking for vulnerabilities l…☆49Nov 10, 2025Updated 5 months ago
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆10Apr 3, 2022Updated 4 years ago
- A Golang program to rotate AWS & GCP account keys☆67May 12, 2025Updated 11 months ago
- A PoC to Simulate Ransomware Attack on AWS Environment☆33Oct 14, 2024Updated last year
- Tools that checks for misconfigured access to Github OIDC from AWS roles and GCP service accounts☆61May 15, 2023Updated 2 years ago
- Compares and analyzes GCP IAM roles.☆79Mar 9, 2025Updated last year
- This Guidance helps organizations provide their data scientists with external package repository access while maintaining information sec…☆22Oct 20, 2024Updated last year
- This is a project to quickly accelerate the adoption of CloudFormation Guard syntax for use in AWS Config rules. The advantage of CloudF…☆13Dec 4, 2024Updated last year
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆59Sep 7, 2023Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- This repository contains a sample IAM permissions boundary as a starting point for creating your own permissions boundary to meet the s…☆92Feb 21, 2025Updated last year
- ☆10Sep 12, 2024Updated last year
- An IAM Simulator that outputs detailed explains of how a request was evaluated.☆102Apr 26, 2026Updated last week
- The Sensitive Data Protection on AWS solution allows enterprise customers to create data catalogs, discover, protect, and visualize sensi…☆125Feb 6, 2025Updated last year
- ☆18Jul 30, 2024Updated last year
- CloudGrappler is a purpose-built tool designed for effortless querying of high-fidelity and single-event detections related to well-known…☆266Nov 21, 2025Updated 5 months ago
- Independently deploy customized honeyservices in AWS to trigger alerts on unauthorized access. It utilizes a dedicated CloudTrail for pre…☆51Nov 16, 2024Updated last year
- Awesome secure by default libraries to help you eliminate bug classes!☆703Dec 6, 2025Updated 4 months ago
- This repository provides sample templates for security playbooks against various scenarios when using Amazon Web Services.☆655Updated this week
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- An evolving repository of CloudTrail events with detailed descriptions, MITRE ATT&CK insights, real-world incidents, references and secur…☆175Mar 11, 2026Updated last month
- Cloud Commotion intends to cause chaos to simulate security incidents☆148Jun 18, 2024Updated last year
- ☆24Feb 21, 2025Updated last year
- Terraform module for OWASP Domain Protect on AWS☆15Updated this week
- ☆11Dec 9, 2025Updated 4 months ago
- Splunk csv to KVStore ES Threat Intel☆11Jul 11, 2016Updated 9 years ago
- GitHub CFN Registry resource☆22Feb 18, 2025Updated last year
- Compare vulnerability scanners results (to make them better!)☆27Updated this week
- ☆231Mar 27, 2026Updated last month
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆17May 16, 2022Updated 3 years ago
- Provides an alternative, or maybe a more user friendly way to use the native boto3 API.☆28Apr 14, 2023Updated 3 years ago
- A command line tool that validates AWS IAM Policies in a Terraform template against AWS IAM best practices☆347Jun 9, 2025Updated 10 months ago
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagrams☆107Jan 30, 2025Updated last year
- This repo contains IOC, malware and malware analysis associated with Public cloud☆249Nov 11, 2024Updated last year
- Analyzes CloudTrail data of a given AWS account and generates a summary of recently active IAM principals, API calls they made, as well a…☆165Dec 21, 2025Updated 4 months ago
- ☆24Jul 20, 2023Updated 2 years ago