Example policies demonstrating how to implement a data perimeter on AWS.
☆194Mar 9, 2026Updated last week
Alternatives and similar repositories for data-perimeter-policy-examples
Users that are interested in data-perimeter-policy-examples are comparing it to the libraries listed below
Sorting:
- Example AWS Service control policies to get started or mature your usage of AWS SCPs.☆287Mar 13, 2026Updated last week
- Collection of example Service Control Policies (SCPs) that are useful for sandbox and training AWS accounts.☆161Dec 22, 2025Updated 2 months ago
- ☆95Dec 1, 2025Updated 3 months ago
- Crowdsourced list of sensitive IAM Actions☆159Oct 29, 2024Updated last year
- ☆17Mar 10, 2025Updated last year
- Data perimeter helper is a tool that helps you design and anticipate the impact of your data perimeter controls☆17Jan 21, 2026Updated 2 months ago
- ☆21Feb 22, 2023Updated 3 years ago
- ☆229Mar 10, 2026Updated last week
- This project provides a solution to AWS customers for reporting on what tags exists, the resources they are applied to, and what resource…☆25Feb 28, 2024Updated 2 years ago
- ☆15Jan 11, 2024Updated 2 years ago
- A command line tool that validates AWS IAM Policies in a Terraform template against AWS IAM best practices☆345Jun 9, 2025Updated 9 months ago
- ☆18Sep 10, 2025Updated 6 months ago
- Guidance for Organization on AWS☆12Nov 26, 2025Updated 3 months ago
- A simple threat modeling tool to help humans to reduce time-to-value when threat modeling☆688Updated this week
- Example AWS Resource control policies to get started or mature your usage of AWS RCPs.☆200Updated this week
- Bare minimum AWS Security Alerting and Secure by default Configuration☆514May 15, 2025Updated 10 months ago
- SCP management tool☆135Oct 23, 2023Updated 2 years ago
- This repository can be used to generate and evaluate findings detected by Amazon GuardDuty☆420Jan 7, 2026Updated 2 months ago
- Demonstration that AWS IAM policy evaluation docs are incorrect☆16Sep 28, 2021Updated 4 years ago
- Automated Security Response on AWS is an add-on solution that works with AWS Security Hub to provide a ready-to-deploy architecture and a…☆466Mar 13, 2026Updated last week
- Resource types that can be publicly exposed on AWS☆331Feb 23, 2022Updated 4 years ago
- AWS Trustline: Check external access on your AWS account☆129Feb 27, 2026Updated 3 weeks ago
- A Python CLI application that demonstrates how you can access AWS services, such as Amazon S3 and Amazon Athena, using trusted identity p…☆12Mar 11, 2025Updated last year
- Automatically compile an AWS Service Control Policy that ONLY allows AWS services that are compliant with your preferred compliance frame…☆224Aug 11, 2023Updated 2 years ago
- ☆12Oct 17, 2023Updated 2 years ago
- Example solutions demonstrating how to implement patterns within the AWS Security Reference Architecture guide using CloudFormation (incl…☆1,122Mar 10, 2026Updated last week
- Analyzes CloudTrail data of a given AWS account and generates a summary of recently active IAM principals, API calls they made, as well a…☆165Dec 21, 2025Updated 3 months ago
- This repository provides sample templates for security playbooks against various scenarios when using Amazon Web Services.☆650Updated this week
- This sample repositories provides an production ready example of enhancing AWS SSO for enterprise usage. We provide an automation for ass…☆16Jul 8, 2025Updated 8 months ago
- Safer AWS SCP deployments via real-time monitoring☆56Sep 30, 2023Updated 2 years ago
- AWS Attack Path Management Tool - Walking on the Moon☆263Dec 5, 2024Updated last year
- Implements OPA-based preventive security controls for AWS Infrastructure using Terraform Infrastructure as Code (IaC), that can establish…☆48Dec 6, 2023Updated 2 years ago
- Collection of samples for Management and Governance services☆69Updated this week
- This script automates the process of running the Security Hub multi-account workflow across a group of accounts that are in your control☆280Jan 23, 2026Updated last month
- Identify all permitted data paths originating from the Internet to Network Interfaces within AWS Accounts across the entire AWS Organizat…☆42Sep 19, 2023Updated 2 years ago
- ASH is an extensible, open source SAST, SCA, and IaC security scanner orchestration engine.☆620Mar 14, 2026Updated last week
- Terraform module for creating a simple private serverless Terraform registry in AWS☆15Oct 14, 2024Updated last year
- ☆22Oct 18, 2023Updated 2 years ago
- Create a break glass role for emergency use in order to limit AWS production account access. Configure automatic alerts and logging of ac…☆180Nov 13, 2023Updated 2 years ago