Adaptive AWS Zero Trust Policy made easy: Auto-generate least-privilege policies based on user activity in real time! Accelerate the adoption of smart access control
☆76May 3, 2024Updated last year
Alternatives and similar repositories for AWSZeroTrustPolicy
Users that are interested in AWSZeroTrustPolicy are comparing it to the libraries listed below
Sorting:
- Curating Falco rules with MITRE ATT&CK Matrix☆88Mar 7, 2024Updated last year
- ☆12Oct 17, 2023Updated 2 years ago
- A Golang program to rotate AWS & GCP account keys☆67May 12, 2025Updated 9 months ago
- This is a project to quickly accelerate the adoption of CloudFormation Guard syntax for use in AWS Config rules. The advantage of CloudF…☆12Dec 4, 2024Updated last year
- ☆17Updated this week
- The Sensitive Data Protection on AWS solution allows enterprise customers to create data catalogs, discover, protect, and visualize sensi…☆125Feb 6, 2025Updated last year
- Scripts and IaC to create a ransomware resilient AWS Backup System☆16Sep 5, 2023Updated 2 years ago
- Compares and analyzes GCP IAM roles.☆78Mar 9, 2025Updated 11 months ago
- ☆17May 16, 2022Updated 3 years ago
- ☆21Apr 17, 2023Updated 2 years ago
- Compare vulnerability scanners results (to make them better!)☆27Updated this week
- Awesome secure by default libraries to help you eliminate bug classes!☆700Dec 6, 2025Updated 2 months ago
- This Guidance helps organizations provide their data scientists with external package repository access while maintaining information sec…☆22Oct 20, 2024Updated last year
- Uses the AWS Cloud Control API to list resources that are present in a given AWS account and region(s). Discovered resources are written …☆182Dec 21, 2025Updated 2 months ago
- An IAM Simulator that outputs detailed explains of how a request was evaluated.☆98Feb 25, 2026Updated last week
- CloudGrappler is a purpose-built tool designed for effortless querying of high-fidelity and single-event detections related to well-known…☆266Nov 21, 2025Updated 3 months ago
- Centralizing AWS CloudWatch log forwarding via EventBridge and Step Functions☆48Feb 12, 2023Updated 3 years ago
- A command line tool that validates AWS IAM Policies in a Terraform template against AWS IAM best practices☆344Jun 9, 2025Updated 8 months ago
- This repository provides sample templates for security playbooks against various scenarios when using Amazon Web Services.☆649Updated this week
- Safer AWS SCP deployments via real-time monitoring☆56Sep 30, 2023Updated 2 years ago
- Independently deploy customized honeyservices in AWS to trigger alerts on unauthorized access. It utilizes a dedicated CloudTrail for pre…☆51Nov 16, 2024Updated last year
- A curated list of resources about detecting threats and defending Kubernetes systems.☆402Sep 2, 2023Updated 2 years ago
- AWS SSO Reporter☆55May 7, 2025Updated 9 months ago
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagrams☆107Jan 30, 2025Updated last year
- Kubernetes admission webhook that uses cosign verify to check the subject and issuer of the image matches what you expect☆24Feb 19, 2026Updated last week
- Analyzes CloudTrail data of a given AWS account and generates a summary of recently active IAM principals, API calls they made, as well a…☆165Dec 21, 2025Updated 2 months ago
- Stop EC2 instances and RDS/Aurora databases overnight by tagging them with cron schedules, to cut AWS costs. Trigger CloudFormation stack…☆76Feb 19, 2026Updated last week
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆59Sep 7, 2023Updated 2 years ago
- Azure Activity Log Axe is a continually developing tool that simplifies the transactional log format provided by Microsoft. The tool leve…☆35Sep 6, 2024Updated last year
- Provides an alternative, or maybe a more user friendly way to use the native boto3 API.☆28Apr 14, 2023Updated 2 years ago
- An API for ssh_scan (https://github.com/mozilla/ssh_scan) and the backend API service for the Mozilla SSH Observatory (https://observator…☆32Feb 16, 2021Updated 5 years ago
- This repo contains IOC, malware and malware analysis associated with Public cloud☆249Nov 11, 2024Updated last year
- Production-ready AWS CloudFormation starter kit with secure OIDC authentication, automated CI/CD, and security scanning. Deploy stacks in…☆27Jan 3, 2026Updated 2 months ago
- EKS NG AMI Updater is an open source project that can be used to update kubernetes node group images.☆28Feb 20, 2026Updated last week
- Solana Airdrop Faucet: A simple web application that allows users to receive free SOL tokens on the Solana Devnet. Built with Next.js, th…☆11Sep 22, 2024Updated last year
- FFXI Gearswap Lua for the impaired☆10Feb 2, 2026Updated last month
- A PoC to Simulate Ransomware Attack on AWS Environment☆33Oct 14, 2024Updated last year
- ☆117Feb 11, 2026Updated 3 weeks ago
- Tool for obfuscating and deobfuscating data.☆76Mar 20, 2024Updated last year