OllieJC / aws-log4j-mitigationsLinks
Mitigations (AWS WAF, Lambda@Edge/CloudFront Functions) to implement on AWS to attempt to prevent log4j exploitation.
☆22Updated 3 years ago
Alternatives and similar repositories for aws-log4j-mitigations
Users that are interested in aws-log4j-mitigations are comparing it to the libraries listed below
Sorting:
- ☆23Updated 2 years ago
- This repository contains the full dataset of AWS IAM data (services, actions, resource types and conditions keys). It's updated on a dail…☆64Updated this week
- A crowdsourced AWS IAM permissions reference.☆99Updated 2 weeks ago
- efsu is for accessing AWS EFS from your machine without a VPN☆42Updated 4 years ago
- Solution to setup a recurring Security Hub CSV full report with email notification to provide detailed report of the security posture.☆22Updated 5 months ago
- A cloud security tool to search and clean up unused AWS access keys, written in Go.☆51Updated 2 years ago
- Centralizing AWS CloudWatch log forwarding via EventBridge and Step Functions☆49Updated 2 years ago
- Crowdsourced list of sensitive IAM Actions☆154Updated 10 months ago
- Python library for examining, creating and optimising IAM policies☆22Updated 3 years ago
- Open-source proof-of-concept client for AWS IAM Roles Anywhere☆71Updated 2 years ago
- AwS CLouD NeTWoRkiNg SuiTE 3000☆22Updated this week
- Stop EC2 instances and RDS/Aurora databases overnight by tagging them with cron schedules, to cut AWS costs. Trigger CloudFormation stack…☆63Updated 2 months ago
- ☆21Updated 2 years ago
- Expand IAM Actions with Wildcards☆33Updated this week
- AWS SSO Reporter☆54Updated 3 months ago
- A schema and set of tools for using SQL to query cloud infrastructure.☆66Updated 3 years ago
- ☆41Updated last month
- Examples, samples, snippets and scripts to use with Steampipe.☆52Updated last year
- Is your AWS perimeter secure? Use Powerpipe and Steampipe to check your AWS accounts for public resources, resources shared with untrust…☆112Updated 3 weeks ago
- CloudSplaining on AWS Managed Policies☆44Updated this week
- The Amazon Elastic Kubernetes Service (EKS) Creation Engine (ECE) is a Python command-line program created by the Lightspin Office of the…☆40Updated 2 years ago
- AWS VPC Subnets Watcher☆78Updated 2 years ago
- Collect IAM information from all your AWS organization, accounts, and resources.☆42Updated this week
- cli tool to read any resource off of AWS API. Also generates Terraform import-blocks, and actual Terraform Resource code.☆142Updated 6 months ago
- Validate all your Customer IAM Policies against AWS Access Analyzer - Policy Validation☆43Updated 4 years ago
- Sample code snippets for consuming the CloudSploit API☆13Updated last year
- Automatically close AWS Accounts when moved to a specific Organizational Unit, such as SuspendedOU or ToBeDeletedOU or BlackHole 😛☆14Updated 3 years ago
- Runs IAM policy linting and security checks against either a single AWS account or multiple member accounts of an AWS Organization.☆146Updated 2 weeks ago
- SSH-Restricted deploys an SSH compliance rule (AWS Config) with auto-remediation via AWS Lambda if SSH access is public.☆30Updated 4 years ago
- AWSXenos will list all the trust relationships in all the IAM roles, S3 buckets, and more☆64Updated 5 months ago