aws-samples / aws-secure-environment-acceleratorLinks
ASEA developer support has ended, and the ASEA github repo will be marked Archived (read-only) by the end of 2025.
☆764Updated last week
Alternatives and similar repositories for aws-secure-environment-accelerator
Users that are interested in aws-secure-environment-accelerator are comparing it to the libraries listed below
Sorting:
- Deploy a multi-account cloud foundation to support highly-regulated workloads and complex compliance requirements.☆716Updated last week
- Workload Discovery on AWS is a solution to visualize AWS Cloud workloads. With it you can build, customize, and share architecture diagra…☆795Updated last month
- Automated Security Response on AWS is an add-on solution that works with AWS Security Hub to provide a ready-to-deploy architecture and a…☆449Updated 2 months ago
- The AWS Config Rules Development Kit helps developers set up, author and test custom Config rules. It contains scripts to enable AWS Conf…☆474Updated last week
- Command Line Interface tool for Cloud Intelligence Dashboards deployment☆486Updated this week
- Guard offers a policy-as-code domain-specific language (DSL) to write rules and validate JSON- and YAML-formatted data such as CloudForma…☆1,358Updated 3 weeks ago
- The Customizations for AWS Control Tower solution combines AWS Control Tower and other highly-available, trusted AWS services to help cus…☆405Updated 3 months ago
- The AWS Deployment Framework (ADF) is an extensive and flexible framework to manage and deploy resources across multiple AWS accounts and…☆690Updated 3 months ago
- AWS Config resource schema define the properties and types of AWS Config resource configuration items (CIs). Resource CI schema are used …☆258Updated 7 months ago
- Open-source temporary elevated access solution for AWS IAM Identity Center.☆436Updated 3 weeks ago
- An AWS tool to help you create a point in time assessment of your AWS account using Prowler.☆571Updated last month
- Monitor AWS Managed IAM Policies Changes☆491Updated this week
- This script automates the process of running the Security Hub multi-account workflow across a group of accounts that are in your control☆279Updated last year
- A command-line tool to get valuable information out of AWS CloudTrail☆825Updated last week
- Bare minimum AWS Security Alerting and Secure by default Configuration☆509Updated 5 months ago
- Terraform module to set up your AWS account with the secure baseline configuration based on CIS Amazon Web Services Foundations and AWS F…☆1,188Updated last year
- AHA is an incident management & communication framework to provide real-time alert customers when there are active AWS event(s). For cust…☆365Updated 10 months ago
- Discover resources created in an AWS account.☆725Updated last year
- Linting tool for CloudFormation templates☆1,299Updated last year
- AWS IAM linting library☆1,098Updated 4 months ago
- Example solutions demonstrating how to implement patterns within the AWS Security Reference Architecture guide using CloudFormation (incl…☆1,095Updated 3 months ago
- This repository can be used to generate and evaluate findings detected by Amazon GuardDuty☆408Updated 4 months ago
- superwerker can help you get started with the AWS Cloud quickly without investing in consultants or devoting time to extensive research. …☆537Updated last week
- A curated list of resources and projects for working with AWS CloudFormation.☆616Updated last year
- A cross-account and cross-region solution that allows customers to automatically start and stop EC2 and RDS Instances☆597Updated last month
- AWS Control Tower Account Factory☆740Updated this week
- Manage AWS Config Rules at scale in AWS multi-account and/or multi-region environment; with fully configurable deployment (RuleSets) and …☆274Updated 5 years ago
- Sample CloudFormation templates and architecture for AWS Service Catalog☆441Updated 2 weeks ago
- aws2tf - automates the importing of existing AWS resources into Terraform and outputs the Terraform HCL code.☆692Updated 2 weeks ago
- CloudTracker helps you find over-privileged IAM users and roles by comparing CloudTrail logs with current IAM policies.☆901Updated 3 years ago