GoogleCloudPlatform / assured-workloads-terraform
☆14Updated 5 months ago
Alternatives and similar repositories for assured-workloads-terraform:
Users that are interested in assured-workloads-terraform are comparing it to the libraries listed below
- Repository to archive GCP Documentation for local use☆13Updated 2 months ago
- ☆24Updated 6 months ago
- Terraform to run Scoutsuite security scan of projects within a Google Cloud Org. Report will be published to a GCS bucket.☆15Updated 8 months ago
- A meta-database collecting resources that compile lists of breaches☆18Updated 2 months ago
- Fun tools around the EBS Direct API☆18Updated 3 years ago
- ☆26Updated 2 months ago
- ☆14Updated 2 years ago
- Compares and analyzes GCP IAM roles.☆77Updated 7 months ago
- Vulnerable by Design AWS Cloud Development Kit (CDK) Infrastructure☆46Updated last year
- Like the unix tree command but for GCP Org Heirarchy☆27Updated 3 years ago
- ☆12Updated 2 months ago
- Scripts to quickly fix security and compliance issues☆25Updated last year
- ☆37Updated 11 months ago
- Varna: Quick & Cheap AWS CloudTrail Monitoring with Event Query Language (EQL)☆51Updated 2 years ago
- Tools that checks for misconfigured access to Github OIDC from AWS roles and GCP service accounts☆60Updated last year
- Security Alert Decoration☆26Updated last month
- Creates needed resources for federating access between a GCP service account and AWS IAM role.☆28Updated 9 months ago
- Clean accounts over permissions in GCP infra at scale☆71Updated last year
- ☆10Updated 2 years ago
- Harness the security superpowers of your cloud asset inventory☆10Updated 3 months ago
- Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Security Management.☆30Updated 3 months ago
- Slack alert bot for matching Github Audit Events☆10Updated 2 months ago
- ☆32Updated 5 months ago
- GKE CIS 1.1.0 Benchmark InSpec Profile☆27Updated 3 years ago
- Simple tool to identify and remediate the use of the AWS EC2 IMDSv1.☆16Updated 3 years ago
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆21Updated 4 months ago
- ☆46Updated 2 months ago
- ☆41Updated last week