Example policies demonstrating how to implement a data perimeter on AWS.
☆193Jan 29, 2026Updated last month
Alternatives and similar repositories for data-perimeter-policy-examples
Users that are interested in data-perimeter-policy-examples are comparing it to the libraries listed below
Sorting:
- Example AWS Service control policies to get started or mature your usage of AWS SCPs.☆285Feb 13, 2026Updated 2 weeks ago
- Collection of example Service Control Policies (SCPs) that are useful for sandbox and training AWS accounts.☆161Dec 22, 2025Updated 2 months ago
- ☆17Mar 10, 2025Updated 11 months ago
- Crowdsourced list of sensitive IAM Actions☆159Oct 29, 2024Updated last year
- ☆21Feb 22, 2023Updated 3 years ago
- A Python CLI application that demonstrates how you can access AWS services, such as Amazon S3 and Amazon Athena, using trusted identity p…☆12Mar 11, 2025Updated 11 months ago
- Guidance for Organization on AWS☆12Nov 26, 2025Updated 3 months ago
- ☆229Updated this week
- ☆93Dec 1, 2025Updated 3 months ago
- SCP management tool☆135Oct 23, 2023Updated 2 years ago
- KYE: Know Your Enemies - Check external access on your AWS account☆129Apr 25, 2025Updated 10 months ago
- ☆15Jan 11, 2024Updated 2 years ago
- This project provides a solution to AWS customers for reporting on what tags exists, the resources they are applied to, and what resource…☆25Feb 28, 2024Updated 2 years ago
- This repository can be used to generate and evaluate findings detected by Amazon GuardDuty☆420Jan 7, 2026Updated last month
- A simple threat modeling tool to help humans to reduce time-to-value when threat modeling☆680Updated this week
- A command line tool that validates AWS IAM Policies in a Terraform template against AWS IAM best practices☆344Jun 9, 2025Updated 8 months ago
- Data perimeter helper is a tool that helps you design and anticipate the impact of your data perimeter controls☆17Jan 21, 2026Updated last month
- Resource types that can be publicly exposed on AWS☆331Feb 23, 2022Updated 4 years ago
- Example AWS Resource control policies to get started or mature your usage of AWS RCPs.☆198Updated this week
- Automated Security Response on AWS is an add-on solution that works with AWS Security Hub to provide a ready-to-deploy architecture and a…☆464Updated this week
- Bare minimum AWS Security Alerting and Secure by default Configuration☆513May 15, 2025Updated 9 months ago
- ☆18Sep 10, 2025Updated 5 months ago
- Terraform module for creating a simple private serverless Terraform registry in AWS☆15Oct 14, 2024Updated last year
- This repository provides sample templates for security playbooks against various scenarios when using Amazon Web Services.☆649Updated this week
- Demonstration that AWS IAM policy evaluation docs are incorrect☆16Sep 28, 2021Updated 4 years ago
- A CLI application to accompany on your terraform module journey and sharing your burden of module dependency updates, just as one brave H…☆20Oct 31, 2024Updated last year
- Safer AWS SCP deployments via real-time monitoring☆56Sep 30, 2023Updated 2 years ago
- A plugin for running Open Policy Agent (OPA) in AWS Lambda as a Lambda Extension.☆29Aug 4, 2023Updated 2 years ago
- This sample repositories provides an production ready example of enhancing AWS SSO for enterprise usage. We provide an automation for ass…☆16Jul 8, 2025Updated 7 months ago
- Automatically compile an AWS Service Control Policy that ONLY allows AWS services that are compliant with your preferred compliance frame…☆224Aug 11, 2023Updated 2 years ago
- Identify all permitted data paths originating from the Internet to Network Interfaces within AWS Accounts across the entire AWS Organizat…☆42Sep 19, 2023Updated 2 years ago
- Example solutions demonstrating how to implement patterns within the AWS Security Reference Architecture guide using CloudFormation (incl…☆1,119Dec 12, 2025Updated 2 months ago
- Analyzes CloudTrail data of a given AWS account and generates a summary of recently active IAM principals, API calls they made, as well a…☆165Dec 21, 2025Updated 2 months ago
- AWS Attack Path Management Tool - Walking on the Moon☆261Dec 5, 2024Updated last year
- ☆10Dec 13, 2023Updated 2 years ago
- ☆13Nov 5, 2024Updated last year
- This tool is a wrapper for calling Terraform commands in the Docker, solving the problem of the Terraform version drift and pain with the…☆25Jan 13, 2026Updated last month
- ☆18Dec 13, 2023Updated 2 years ago
- ASH is an extensible, open source SAST, SCA, and IaC security scanner orchestration engine.☆611Updated this week