GenAIGator / iam-policy-scannerLinks
Scans IAM Policies and Roles for Possible Security Issues
☆15Updated 3 years ago
Alternatives and similar repositories for iam-policy-scanner
Users that are interested in iam-policy-scanner are comparing it to the libraries listed below
Sorting:
- ☆39Updated 4 years ago
- This project provides a solution to AWS customers for reporting on what tags exists, the resources they are applied to, and what resource…☆22Updated last year
- Collection of samples for Management and Governance services☆68Updated 4 months ago
- ☆91Updated 4 months ago
- This repository contains a sample IAM permissions boundary as a starting point for creating your own permissions boundary to meet the s…☆84Updated 6 months ago
- Example policies demonstrating how to implement a data perimeter on AWS.☆176Updated this week
- AWS IAM Permissions Guardrails https://aws-samples.github.io/aws-iam-permissions-guardrails/☆124Updated 2 years ago
- Collection of example Service Control Policies (SCPs) that are useful for sandbox and training AWS accounts.☆153Updated 2 months ago
- Implement backup and recovery with AWS Backup across your AWS Organizations using a CI/CD pipeline (AWS CodePipeline).☆40Updated 9 months ago
- ☆34Updated 3 years ago
- This solution is intended for enterprises that need a streamlined way of managing user access to their AWS accounts. Using this solution,…☆70Updated 5 months ago
- SCP management tool☆133Updated last year
- Collection of semi-useful Service Control Policies and scripts to manage them☆99Updated 7 months ago
- ☆141Updated 2 weeks ago
- ☆57Updated last year
- ☆21Updated 7 months ago
- AWS STS Network Query Tool uses cross account roles to collect networking related information for multiple accounts and outputs a CSV.☆26Updated last year
- A simple python script to generate security hub scores within your AWS account.☆30Updated last year
- ☆23Updated 2 years ago
- This solution supports a bidirectional integration between Security Hub and JIRA. Issues can be either created automatically or manually …☆41Updated last year
- Automated AWS Organizations configuration for security operations☆37Updated 6 months ago
- This solutions facilitates rapid deployment of Prowler, full AWS Organization analysis, and finding processing as part of a security post…☆62Updated 3 months ago
- aws-solutions-library-samples / guidance-for-cross-network-traffic-inspection-with-aws-network-firewallThis Guidance demonstrates how to automate the deployment of centralized network security infrastructure that inspects and filters traffi…☆44Updated this week
- ☆21Updated 2 years ago
- Accelerate AWS IAM Identity Center (successor to AWS Single Sign-On (SSO)) implementation using AWS CDK. This CDK program allows you to c…☆35Updated 2 years ago
- ☆42Updated last year
- This Guidance demonstrates how to analyze AWS Health events across multiple AWS accounts using natural language queries and generative bu…☆46Updated 2 months ago
- ☆36Updated 2 years ago
- This solution will help you automate user group assignment to permission sets in AWS IAM Identity center for accessing any or all AWS acc…☆25Updated 5 months ago
- Sample code for integrating AWS CloudFormation templates security tests (using CFN-Nag and CFN-Guard) with both AWS Security Hub and AWS …☆24Updated last year