Adaptive AWS Zero Trust Policy made easy: Auto-generate least-privilege policies based on user activity in real time! Accelerate the adoption of smart access control
☆76May 3, 2024Updated last year
Alternatives and similar repositories for AWSZeroTrustPolicy
Users that are interested in AWSZeroTrustPolicy are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Curating Falco rules with MITRE ATT&CK Matrix☆88Mar 7, 2024Updated 2 years ago
- ☆12Oct 17, 2023Updated 2 years ago
- ☆21Apr 17, 2023Updated 2 years ago
- A tool to automatically give AWS IAM users access to your Kubernetes cluster.☆50Mar 10, 2026Updated 2 weeks ago
- ☆17Updated this week
- CloudDefense.ai is an automated web application security testing tool that audits your web applications by checking for vulnerabilities l…☆49Nov 10, 2025Updated 4 months ago
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆10Apr 3, 2022Updated 3 years ago
- A Golang program to rotate AWS & GCP account keys☆67May 12, 2025Updated 10 months ago
- A PoC to Simulate Ransomware Attack on AWS Environment☆33Oct 14, 2024Updated last year
- Tools that checks for misconfigured access to Github OIDC from AWS roles and GCP service accounts☆61May 15, 2023Updated 2 years ago
- Compares and analyzes GCP IAM roles.☆78Mar 9, 2025Updated last year
- ☆30Jan 13, 2026Updated 2 months ago
- This Guidance helps organizations provide their data scientists with external package repository access while maintaining information sec…☆22Oct 20, 2024Updated last year
- This is a project to quickly accelerate the adoption of CloudFormation Guard syntax for use in AWS Config rules. The advantage of CloudF…☆13Dec 4, 2024Updated last year
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆59Sep 7, 2023Updated 2 years ago
- This repository contains a sample IAM permissions boundary as a starting point for creating your own permissions boundary to meet the s…☆90Feb 21, 2025Updated last year
- ☆10Sep 12, 2024Updated last year
- An IAM Simulator that outputs detailed explains of how a request was evaluated.☆100Mar 14, 2026Updated last week
- The Sensitive Data Protection on AWS solution allows enterprise customers to create data catalogs, discover, protect, and visualize sensi…☆125Feb 6, 2025Updated last year
- ☆18Jul 30, 2024Updated last year
- CloudGrappler is a purpose-built tool designed for effortless querying of high-fidelity and single-event detections related to well-known…☆266Nov 21, 2025Updated 4 months ago
- Independently deploy customized honeyservices in AWS to trigger alerts on unauthorized access. It utilizes a dedicated CloudTrail for pre…☆51Nov 16, 2024Updated last year
- Awesome secure by default libraries to help you eliminate bug classes!☆701Dec 6, 2025Updated 3 months ago
- This repository provides sample templates for security playbooks against various scenarios when using Amazon Web Services.☆650Updated this week
- Cloud Commotion intends to cause chaos to simulate security incidents☆146Jun 18, 2024Updated last year
- An evolving repository of CloudTrail events with detailed descriptions, MITRE ATT&CK insights, real-world incidents, references and secur…☆174Mar 11, 2026Updated 2 weeks ago
- ☆24Feb 21, 2025Updated last year
- Terraform module for OWASP Domain Protect on AWS☆15Updated this week
- Splunk csv to KVStore ES Threat Intel☆11Jul 11, 2016Updated 9 years ago
- Keep track of changes in website with WEBSY☆35May 22, 2023Updated 2 years ago
- Uses the AWS Cloud Control API to list resources that are present in a given AWS account and region(s). Discovered resources are written …☆182Dec 21, 2025Updated 3 months ago
- AWS CloudFormation templates and Python code for AWS blog post on how to automate IAM credential reports at scale across AWS.☆18Sep 19, 2022Updated 3 years ago
- GitHub CFN Registry resource☆22Feb 18, 2025Updated last year
- Compare vulnerability scanners results (to make them better!)☆27Updated this week
- ☆229Mar 10, 2026Updated 2 weeks ago
- ☆17May 16, 2022Updated 3 years ago
- An API for ssh_scan (https://github.com/mozilla/ssh_scan) and the backend API service for the Mozilla SSH Observatory (https://observator…☆32Feb 16, 2021Updated 5 years ago
- Scripts and IaC to create a ransomware resilient AWS Backup System☆16Sep 5, 2023Updated 2 years ago
- Stop EC2 instances and RDS/Aurora databases overnight by tagging them with cron schedules, to cut AWS costs. Trigger CloudFormation stack…☆76Mar 14, 2026Updated last week