aws-samples / aws-iam-identity-center-pipeline
☆20Updated 3 weeks ago
Alternatives and similar repositories for aws-iam-identity-center-pipeline:
Users that are interested in aws-iam-identity-center-pipeline are comparing it to the libraries listed below
- Collection of samples for Management and Governance services☆64Updated 2 weeks ago
- Implement backup and recovery with AWS Backup across your AWS Organizations using a CI/CD pipeline (AWS CodePipeline).☆36Updated 2 months ago
- Solution and deployment for recurring Security Hub Summary email to provide recipients with a proactive communication summarizing the sec…☆40Updated last month
- ☆34Updated 2 years ago
- Accelerate AWS IAM Identity Center (successor to AWS Single Sign-On (SSO)) implementation using AWS CDK. This CDK program allows you to c…☆25Updated 2 years ago
- This solutions facilitates rapid deployment of Prowler, full AWS Organization analysis, and finding processing as part of a security post…☆54Updated 2 months ago
- This solution is intended for enterprises that need a streamlined way of managing user access to their AWS accounts. Using this solution,…☆66Updated this week
- Account Assessment for AWS Organizations programmatically scans all AWS accounts in an AWS Organization for identity-based and resource-b…☆33Updated last week
- This solution will help you automate user group assignment to permission sets in AWS IAM Identity center for accessing any or all AWS acc…☆21Updated last year
- This project provides a solution to AWS customers for reporting on what tags exists, the resources they are applied to, and what resource…☆21Updated 11 months ago
- Using Terraform to enable Amazon GuardDuty for accounts in AWS Organizations.☆57Updated 3 months ago
- AWS IAM Permissions Guardrails https://aws-samples.github.io/aws-iam-permissions-guardrails/☆124Updated last year
- ☆57Updated last year
- Automated AWS Organizations configuration for security operations☆36Updated this week
- Example policies demonstrating how to implement a data perimeter on AWS.☆145Updated this week
- ☆137Updated 5 months ago
- This repository contains a sample IAM permissions boundary as a starting point for creating your own permissions boundary to meet the s…☆75Updated 6 months ago
- Hands-on workshop on how to build security automation in pipelines☆37Updated 9 months ago
- ☆29Updated last year
- Tag based CloudWatch dashboard uses CDK and resource groups tagging API to automatically produce CloudFormation templates for CloudWatch …☆44Updated this week
- This pattern describes how to use AWS Control Tower Controls, AWS Cloud Development Kit (CDK) and infrastructure as code to implement and…☆37Updated this week
- ☆20Updated last year
- In this workshop, you will learn techniques to implement your Disaster Recovery strategies based on AWS multi-region approach. Questions?…☆25Updated 8 months ago
- Automated Amazon GuardDuty Security Response☆27Updated last month
- ☆85Updated last year
- ☆39Updated this week
- Example AWS Service control policies to get started or mature your usage of AWS SCPs.☆232Updated this week
- DBTop Monitoring is lightweight application to perform realtime monitoring for AWS Database Resources. Based on same simplicity concept o…☆42Updated 3 weeks ago
- Standardised pipeline accelerators for AWS CodePipeline and GitLab CI for Infrastructure provisioning tools like CloudFormation, CDK and …☆35Updated 2 weeks ago
- ☆20Updated 7 months ago