aquia-inc / scpkit
SCP management tool
☆129Updated last year
Alternatives and similar repositories for scpkit:
Users that are interested in scpkit are comparing it to the libraries listed below
- Example policies demonstrating how to implement a data perimeter on AWS.☆140Updated last month
- Crowdsourced list of sensitive IAM Actions☆140Updated 2 months ago
- ☆133Updated this week
- Safer AWS SCP deployments via real-time monitoring☆49Updated last year
- ☆143Updated last month
- This solution supports a bidirectional integration between Security Hub and JIRA. Issues can be either created automatically or manually …☆37Updated 5 months ago
- Kickstart and manage your AWS Organization via Terraform☆77Updated this week
- A cloud security tool to search and clean up unused AWS access keys, written in Go.☆49Updated 2 years ago
- ☆134Updated last week
- Example AWS Service control policies to get started or mature your usage of AWS SCPs.☆229Updated this week
- AWS SSO Reporter☆54Updated last year
- This solutions facilitates rapid deployment of Prowler, full AWS Organization analysis, and finding processing as part of a security post…☆54Updated last month
- ☆38Updated 3 years ago
- Publicly-listed AWS account IDs for easy lookup. Great for cleaning up false positives from unknown Account IDs in Cloudtrail☆38Updated 7 months ago
- Collection of semi-useful Service Control Policies and scripts to manage them☆84Updated this week
- ☆111Updated this week
- AWS Organizations Service Control Policies (SCPs) written in HashiCorp Terraform.☆234Updated 3 months ago
- AWS IAM Permissions Guardrails https://aws-samples.github.io/aws-iam-permissions-guardrails/☆123Updated last year
- A collection of documented and undocumented AWS API models☆31Updated 2 months ago
- Expand IAM Actions with Wildcards☆27Updated 3 weeks ago
- ☆154Updated last week
- ☆84Updated last year
- The Amazon Elastic Kubernetes Service (EKS) Creation Engine (ECE) is a Python command-line program created by the Lightspin Office of the…☆40Updated 2 years ago
- This implementation demonstrates the AWS Identity and Access Management (IAM) Access Analyzer policy validation capability. Learn how to …☆23Updated 2 years ago
- Assisted Log Enabler for AWS - Find AWS resources that are not logging, and turn them on.☆245Updated this week
- Example AWS Resource control policies to get started or mature your usage of AWS RCPs.☆55Updated this week
- Access Undenied parses AWS AccessDenied CloudTrail events, explains the reasons for them, and offers actionable remediation steps. Open-s…☆261Updated last year
- A crowdsourced AWS IAM permissions reference.☆89Updated 3 weeks ago
- Scripts to quickly fix security and compliance issues☆104Updated last year
- ☆124Updated last month