FogSecurity / aws-encryption-trackerLinks
Tracker for Encryption by Default for AWS Resources
☆14Updated 2 months ago
Alternatives and similar repositories for aws-encryption-tracker
Users that are interested in aws-encryption-tracker are comparing it to the libraries listed below
Sorting:
- Safer AWS SCP deployments via real-time monitoring☆53Updated last year
- Example policies demonstrating how to implement a data perimeter on AWS.☆165Updated this week
- Generates runbooks for GuardDuty findings☆36Updated last year
- Listing of resources for example AWS Service Control Policies (SCPs)☆17Updated last year
- TrailAlerts is a AWS-native, serverless cloud-detection tool that lets you define simple rules as code and get rich alerts about events i…☆44Updated last month
- Runs IAM policy linting and security checks against either a single AWS account or a set of member accounts of an AWS Organization.☆145Updated this week
- Crowdsourced list of sensitive IAM Actions☆150Updated 7 months ago
- Convert cloudtrail data to MITRE ATT&CK Sightings☆80Updated 2 years ago
- A collection of documented and undocumented AWS API models☆36Updated 7 months ago
- ☆117Updated 3 weeks ago
- ☆12Updated last year
- https://breaches.cloud☆40Updated 8 months ago
- KYE: Know Your Enemies - Check external access on your AWS account☆119Updated 2 months ago
- Threat Designer is a GenerativeAI application designed to automate and streamline the threat modeling process for secure system design.☆68Updated this week
- SCP management tool☆132Updated last year
- AWS SSO Reporter☆54Updated last month
- Scripts to quickly fix security and compliance issues☆27Updated last year
- AWS honey token manager☆87Updated 10 months ago
- Analyzes CloudTrail data of a given AWS account and generates a summary of recently active IAM principals, API calls they made, as well a…☆163Updated 2 months ago
- Collection of example Service Control Policies (SCPs) that are useful for sandbox and training AWS accounts.☆149Updated 6 months ago
- This solutions facilitates rapid deployment of Prowler, full AWS Organization analysis, and finding processing as part of a security post…