aws-samples / access-aws-services-programmatically-using-tipLinks
A Python CLI application that demonstrates how you can access AWS services, such as Amazon S3 and Amazon Athena, using trusted identity propagation.
☆12Updated 10 months ago
Alternatives and similar repositories for access-aws-services-programmatically-using-tip
Users that are interested in access-aws-services-programmatically-using-tip are comparing it to the libraries listed below
Sorting:
- Guidance for Organization on AWS☆12Updated last month
- ☆15Updated last year
- ☆15Updated 8 months ago
- ☆10Updated 2 years ago
- ☆18Updated 10 months ago
- ☆12Updated last year
- ☆16Updated 11 months ago
- ☆22Updated last year
- The Alarm Context Tool (ACT) enhances AWS CloudWatch Alarms by providing additional context to aid in troubleshooting and analysis.☆35Updated last year
- This Guidance helps customers assess their foundational security setup in their AWS account☆23Updated last year
- ☆17Updated 10 months ago
- Solution to specify elastic and dynamic cloud resources as objects that can be easily referenced within AWS Network Firewall rules☆18Updated 10 months ago
- ☆12Updated 3 years ago
- Automate rule management for AWS Network Firewall☆16Updated this week
- aws-samples / automating-pii-data-detection-and-data-masking-tasks-with-aws-glue-databrew-and-aws-step-functions☆26Updated 3 years ago
- ☆18Updated last month
- ☆14Updated 3 years ago
- Account Assessment for AWS Organizations programmatically scans all AWS accounts in an AWS Organization for identity-based and resource-b…☆41Updated this week
- ☆16Updated 2 years ago
- CCCS security control profiles expressed using OSCAL☆19Updated 3 months ago
- This repository contains source code for the AWS Database Blog Post Reduce data archiving costs for compliance by automating RDS snapshot…☆20Updated 2 years ago
- ☆14Updated 2 years ago
- This project provides a solution to AWS customers for reporting on what tags exists, the resources they are applied to, and what resource…☆24Updated last year
- This repository contains the source code of the Verifiable Controls Evidence Store solution☆19Updated 10 months ago
- Accelerate AWS IAM Identity Center (successor to AWS Single Sign-On (SSO)) implementation using AWS CDK. This CDK program allows you to c…☆35Updated 2 years ago
- A collection of samples, best practices and reference architectures for implementing SaaS applications on AWS for databases and data serv…☆60Updated 3 months ago
- ☆36Updated 2 years ago
- The Amazon Web Services (AWS) Config Resource Compliance Dashboard (CRCD) shows the inventory of your AWS resources, along with their com…☆25Updated this week
- Sample CloudFormation templates and architecture for AWS Control Tower☆29Updated 2 years ago
- Examples for consuming Private API Gateway across AWS Accounts☆21Updated this week