aws-samples / aws-cognito-okta-federationLinks
☆24Updated last year
Alternatives and similar repositories for aws-cognito-okta-federation
Users that are interested in aws-cognito-okta-federation are comparing it to the libraries listed below
Sorting:
- Safer AWS SCP deployments via real-time monitoring☆55Updated last year
- ☆34Updated 2 years ago
- A collection of documented and undocumented AWS API models☆37Updated 10 months ago
- ☆32Updated last year
- AWS SSO Reporter☆54Updated 4 months ago
- ☆21Updated 2 years ago
- Collect IAM information from all your AWS organization, accounts, and resources.☆44Updated this week
- Centralizing AWS CloudWatch log forwarding via EventBridge and Step Functions☆48Updated 2 years ago
- Scripts to quickly fix security and compliance issues☆27Updated last year
- Data perimeter helper is a tool that helps you design and anticipate the impact of your data perimeter controls☆17Updated 6 months ago
- Repository to archive AWS Documentation for local use☆49Updated 11 months ago
- Expand IAM Actions with Wildcards☆33Updated this week
- Crowdsourced list of sensitive IAM Actions☆154Updated 10 months ago
- Tool for signing and verifying the integrity of CloudFormation templates☆15Updated 2 years ago
- Sample code for integrating AWS CloudFormation templates security tests (using CFN-Nag and CFN-Guard) with both AWS Security Hub and AWS …☆24Updated last year
- PolicyGlass allows you to analyse one or more AWS policies' effective permissions in aggregate, by restating them in the form of PolicySh…☆60Updated 3 years ago
- A cloud security tool to search and clean up unused AWS access keys, written in Go.☆51Updated 3 years ago
- ☆41Updated 2 months ago
- Hands-on workshop on how to build security automation in pipelines☆37Updated last year
- This package provides an easy way to create a refreshable boto3 Session with AWS Roles Anywhere.☆59Updated 4 months ago
- ☆23Updated 2 years ago
- IAM-Deescalate helps mitigate privilege escalation risk in AWS identity and access management (IAM)☆98Updated 3 years ago
- A Solution for AWS Resource Tagging Automation☆51Updated last month
- Assess certain AWS network configurations☆12Updated 7 years ago
- To clean up your AWS AMIs: First, include AMIs by name or tag. Second, exclude AMIs in use, younger than N days, or the newest N images. …☆36Updated 3 weeks ago
- This implementation demonstrates the AWS Identity and Access Management (IAM) Access Analyzer policy validation capability. Learn how to …☆24Updated 3 years ago
- CDK app to setup an isolated AWS network to experiment with ways of exfiltrating data☆18Updated 3 years ago
- Vulnerable by Design AWS Cloud Development Kit (CDK) Infrastructure☆47Updated last year
- Runs IAM policy linting and security checks against either a single AWS account or multiple member accounts of an AWS Organization.☆149Updated last month
- Finders Keypers: AWS KMS Encryption Key Usage and Blast Radius Finder☆45Updated last month