aws-samples / aws-codepipeline-docker-vulnerability-scan
CloudFormation Templates to deploy CoreOS Clair and Nginx Website on ECS Fargate as an ECS Service. Also create a CodePipeline for updating the Nginx ECS service on code change.
☆35Updated 5 years ago
Alternatives and similar repositories for aws-codepipeline-docker-vulnerability-scan:
Users that are interested in aws-codepipeline-docker-vulnerability-scan are comparing it to the libraries listed below
- An automated reference implementation that assists with setting up corss account roles for easy federation of users from one AWS master a…☆57Updated 6 years ago
- Shell script that automates the copy of encrypted AMI across accounts and regions.☆56Updated last month
- Lambda job in Python to automatically patch EC2 instances when an inspector assessment generates a CVE finding☆58Updated 6 years ago
- Serverless, SSHless, Continuous Configuration Management☆79Updated 5 years ago
- AWS Quick Start Team☆67Updated 2 years ago
- WARNING- This package is no longer supported and will be replaced in the near future. An automated CI/CD Pipeline solution to help accele…☆62Updated 5 years ago
- This post will explore the idea of using an AWS Lambda function, in combination with AutoScaling Lifecycle Hooks and a DynamoDB table, to…☆54Updated 5 years ago
- A lambda function, a cloudformation template to get it running, and example templates showing how to use a custom resource (calling the l…☆73Updated 7 years ago
- Workshop exercise materials for re:Invent 2017 - SID 341: Using AWS CloudTrail Logs for Scalable, Automated Anomaly Detection☆51Updated 5 years ago
- Lambda job in Python to automatically deploy Inspector agent to newly-launched EC2 instances☆28Updated 6 years ago
- Example of how to run the Clair image scanner on AWS ECS Fargate☆27Updated 6 years ago
- Example container image re-scan with Amazon ECR☆50Updated 3 years ago
- ☆86Updated 5 years ago
- Cost Optimization Monitor solution as a reference deployment which provides dashboard and reporting capabilities giving customers a singl…☆60Updated 5 years ago
- A project to create AWS Config Rules and use them to test AWS Resource compliance.☆21Updated 5 years ago
- this is source code of python script use for validation CF template => more in the blog https://aws.amazon.com/blogs/devops/validating-aw…☆52Updated 6 years ago
- Generates an AWS Config Snapshot and ingests it into ElasticSearch for further analysis using Kibana☆71Updated 4 years ago
- Lab materials and documentation for the workshop ARC325 Managing Multiple Accounts at Scale at re:Invent 2017☆78Updated 5 years ago
- A solution for automated and scheduled execution of actions on selected AWS resources, including an updated EBS Snapshot Scheduler☆101Updated last year
- Demonstrates sending AWS findings to your Slack Channel☆56Updated last year
- A utility to convert your Python or Bash programs into SSM documents (and optionally - CloudFormation templates, containing those documen…☆63Updated 6 years ago
- Python scripts to run in AWS Lambda to process findings from Amazon Inspector☆39Updated 6 years ago
- This repository contains exercises that show how to use AWS Secrets Manager in different scenarios.☆41Updated 3 years ago
- EFS backup solution performs backup from source EFS to destination EFS. It utilizes fpsync utils (fpart + rysnc) for efficient incrementa…☆95Updated 3 years ago
- Centralized logging infrastructure for multiple AWS accounts using CloudFormation and Python☆50Updated 5 years ago
- A CloudFormation custom resource provider for adding an IAM SAML provider.☆22Updated 2 months ago
- [WORK IN PROGRESS] A repo containing rule sets for cloud-custodian inside GSA AWS accounts. This repo does not contain cloud-custodian it…☆29Updated 7 years ago
- This CloudWatch Events rule Lambda function evaluates AWS API calls that change Amazon EC2 security group ingress rules. The function fla…☆25Updated 5 years ago
- A solution for near real-time monitoring of replication of objects in Amazon S3 between a source bucket and a destination bucket across m…☆39Updated last year
- An AWS config rule that uses IAM Access Advisor to find over-permissioned IAM users, groups, and roles.☆16Updated 5 years ago