Scripts to quickly fix security and compliance issues
☆106Nov 22, 2023Updated 2 years ago
Alternatives and similar repositories for aws-fast-fixes
Users that are interested in aws-fast-fixes are comparing it to the libraries listed below
Sorting:
- Assess certain AWS network configurations☆12Aug 22, 2018Updated 7 years ago
- CDK app to setup an isolated AWS network to experiment with ways of exfiltrating data☆18Nov 18, 2021Updated 4 years ago
- Open source application to instantly remediate common security issues through the use of AWS Config☆219Sep 3, 2020Updated 5 years ago
- Safer AWS SCP deployments via real-time monitoring☆56Sep 30, 2023Updated 2 years ago
- Cloudformation Template and Lambda to detect if Instance Profile credentials are being used outside your AWS Account.☆29Aug 18, 2019Updated 6 years ago
- PolicyGlass allows you to analyse one or more AWS policies' effective permissions in aggregate, by restating them in the form of PolicySh…☆60Jan 9, 2022Updated 4 years ago
- Monitor AWS Managed IAM Policies Changes☆493Updated this week
- Transform AWS Config snapshots to a more AWS Athena-friendly format.☆11Aug 26, 2020Updated 5 years ago
- A build image for doing CI/CD with Docker and AWS Fargate☆12Feb 13, 2026Updated 3 weeks ago
- Blazing CloudTrail since 2018☆138Jan 27, 2019Updated 7 years ago
- ☆40Sep 14, 2021Updated 4 years ago
- ☆22Oct 16, 2025Updated 4 months ago
- ☆375Feb 23, 2024Updated 2 years ago
- ☆35Nov 4, 2020Updated 5 years ago
- ☆157Jul 8, 2023Updated 2 years ago
- Salesforce Policy Deviation Checker☆30Sep 30, 2020Updated 5 years ago
- Proof of concept incident response demo using SSM and AWS Fargate.☆14Dec 5, 2019Updated 6 years ago
- A Security Scanner for Go☆26Feb 11, 2019Updated 7 years ago
- Updated incident response generator for training classes☆43Jun 2, 2021Updated 4 years ago
- automated monorepo of public CloudFormation AWS resource providers☆18Nov 1, 2025Updated 4 months ago
- SCP management tool☆135Oct 23, 2023Updated 2 years ago
- 'Continuous' AWS perimeter monitoring: Periodically scan internet facing AWS resources to detect misconfigured services.☆64Aug 9, 2019Updated 6 years ago
- Tools to help automate your AWS Accounts☆100Sep 2, 2024Updated last year
- Manage GuardDuty At Enterprise Scale☆22Sep 17, 2020Updated 5 years ago
- An AWS config rule that uses IAM Access Advisor to find over-permissioned IAM users, groups, and roles.☆17Oct 21, 2019Updated 6 years ago
- An implementation of infrastructure-as-code scanning using dynamic tooling.☆56Jan 18, 2022Updated 4 years ago
- ☆23Feb 20, 2023Updated 3 years ago
- ☆93Dec 6, 2021Updated 4 years ago
- Resource types that can be publicly exposed on AWS☆331Feb 23, 2022Updated 4 years ago
- Crowdsourced list of sensitive IAM Actions☆159Oct 29, 2024Updated last year
- Automated Attack Simulation in the Cloud, complete with detection use cases.☆605Nov 28, 2024Updated last year
- AWS Inventory and Compliance Framework☆224Jul 12, 2023Updated 2 years ago
- Example detection of compromise credentials in AWS☆122Aug 6, 2018Updated 7 years ago
- A project to collate IAM actions, AWS APIs and managed policies from various public sources.☆302Updated this week
- Research on the enumeration of IAM permissions without logging to CloudTrail☆60Jun 11, 2021Updated 4 years ago
- Utility for downloading and mounting EBS snapshots using the EBS Direct API's☆91Mar 17, 2025Updated 11 months ago
- Prevent SSRF attacks on AWS EC2 via automated upgrades to the more secure Instance Metadata Service v2 (IMDSv2).☆144May 1, 2025Updated 10 months ago
- Better AWS SSM Session manager CLI client☆517Jun 3, 2024Updated last year
- AWS Metadata Proxy for protection against SSRF☆68Mar 3, 2020Updated 6 years ago