CloudWanderer-io / PolicyGlassLinks
PolicyGlass allows you to analyse one or more AWS policies' effective permissions in aggregate, by restating them in the form of PolicyShards which are always Allow, never Deny.
☆59Updated 3 years ago
Alternatives and similar repositories for PolicyGlass
Users that are interested in PolicyGlass are comparing it to the libraries listed below
Sorting:
- CloudSplaining on AWS Managed Policies☆43Updated this week
- Safer AWS SCP deployments via real-time monitoring☆53Updated last year
- Scripts to quickly fix security and compliance issues☆27Updated last year
- Compares and analyzes GCP IAM roles.☆77Updated 3 months ago
- A cloud security tool to search and clean up unused AWS access keys, written in Go.☆49Updated 2 years ago
- Validate all your Customer IAM Policies against AWS Access Analyzer - Policy Validation☆43Updated 4 years ago
- AWS SSO Reporter☆54Updated last month
- ☆22Updated 2 years ago
- Cloudformation Template and Lambda to detect if Instance Profile credentials are being used outside your AWS Account.☆29Updated 5 years ago
- This implementation demonstrates the AWS Identity and Access Management (IAM) Access Analyzer policy validation capability. Learn how to …☆24Updated 3 years ago
- ☆156Updated last year
- Public tables and other research that can accept PRs. Please visit the web link.☆44Updated 5 years ago
- Prevent SSRF attacks on AWS EC2 via automated upgrades to the more secure Instance Metadata Service v2 (IMDSv2).☆143Updated last month
- Glue workflow to convert CloudTrail logs to Athena-friendly Parquet format☆48Updated last year
- A crowdsourced AWS IAM permissions reference.☆96Updated 4 months ago
- A Golang program to rotate AWS & GCP account keys☆65Updated last month
- Collect IAM information from all your AWS organization, accounts, and resources.☆28Updated this week
- sgCheckup generates nmap output based on scanning your AWS Security Groups for unexpected open ports.☆81Updated 3 years ago
- SCP management tool☆132Updated last year
- Deliberately vulnerable AWS resources for security assessment demos☆31Updated 2 years ago
- Github action for linting AWS IAM policy documents☆38Updated 2 years ago
- AWSXenos will list all the trust relationships in all the IAM roles, S3 buckets, and more☆62Updated 3 months ago
- ☆82Updated 4 years ago
- AWS docs, guides, and other tools☆76Updated 2 years ago
- 'Continuous' AWS perimeter monitoring: Periodically scan internet facing AWS resources to detect misconfigured services.☆64Updated 5 years ago
- Example code for setting up CIS Benchmarks using EventBridge☆20Updated 3 years ago
- Assess certain AWS network configurations☆12Updated 6 years ago
- Lightspin AWS IAM Vulnerability Scanner☆96Updated 4 years ago
- SSH-Restricted deploys an SSH compliance rule (AWS Config) with auto-remediation via AWS Lambda if SSH access is public.☆30Updated 4 years ago
- Identify all permitted data paths originating from the Internet to Network Interfaces within AWS Accounts across the entire AWS Organizat…☆39Updated last year