Example policies demonstrating how to implement a data perimeter on AWS.
☆203Apr 20, 2026Updated last week
Alternatives and similar repositories for data-perimeter-policy-examples
Users that are interested in data-perimeter-policy-examples are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Example AWS Service control policies to get started or mature your usage of AWS SCPs.☆300Apr 9, 2026Updated 3 weeks ago
- Collection of example Service Control Policies (SCPs) that are useful for sandbox and training AWS accounts.☆161Dec 22, 2025Updated 4 months ago
- ☆95Dec 1, 2025Updated 5 months ago
- Crowdsourced list of sensitive IAM Actions☆159Oct 29, 2024Updated last year
- ☆17Mar 10, 2025Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Data perimeter helper is a tool that helps you design and anticipate the impact of your data perimeter controls☆17Jan 21, 2026Updated 3 months ago
- ☆21Feb 22, 2023Updated 3 years ago
- ☆19Sep 10, 2025Updated 7 months ago
- ☆231Mar 27, 2026Updated last month
- This project provides a solution to AWS customers for reporting on what tags exists, the resources they are applied to, and what resource…☆25Feb 28, 2024Updated 2 years ago
- ☆15Jan 11, 2024Updated 2 years ago
- Automated Security Response on AWS is an add-on solution that works with AWS Security Hub to provide a ready-to-deploy architecture and a…☆473Apr 21, 2026Updated last week
- A command line tool that validates AWS IAM Policies in a Terraform template against AWS IAM best practices☆347Jun 9, 2025Updated 10 months ago
- Guidance for Organization on AWS☆13Nov 26, 2025Updated 5 months ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- SCP management tool☆136Oct 23, 2023Updated 2 years ago
- Example AWS Resource control policies to get started or mature your usage of AWS RCPs.☆203Mar 17, 2026Updated last month
- A simple threat modeling tool to help humans to reduce time-to-value when threat modeling☆708Updated this week
- Bare minimum AWS Security Alerting and Secure by default Configuration☆514May 15, 2025Updated 11 months ago
- This repository can be used to generate and evaluate findings detected by Amazon GuardDuty☆422Jan 7, 2026Updated 3 months ago
- Demonstration that AWS IAM policy evaluation docs are incorrect☆16Sep 28, 2021Updated 4 years ago
- Resource types that can be publicly exposed on AWS☆331Feb 23, 2022Updated 4 years ago
- AWS Trustline: Check external access on your AWS account☆129Feb 27, 2026Updated 2 months ago
- Automatically compile an AWS Service Control Policy that ONLY allows AWS services that are compliant with your preferred compliance frame…☆224Aug 11, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Example solutions demonstrating how to implement patterns within the AWS Security Reference Architecture guide using CloudFormation (incl…☆1,127Mar 10, 2026Updated last month
- This repository provides sample templates for security playbooks against various scenarios when using Amazon Web Services.☆655Updated this week
- ☆12Oct 17, 2023Updated 2 years ago
- Analyzes CloudTrail data of a given AWS account and generates a summary of recently active IAM principals, API calls they made, as well a…☆165Dec 21, 2025Updated 4 months ago
- This sample repositories provides an production ready example of enhancing AWS SSO for enterprise usage. We provide an automation for ass…☆16Jul 8, 2025Updated 9 months ago
- Safer AWS SCP deployments via real-time monitoring☆56Sep 30, 2023Updated 2 years ago
- A Python CLI application that demonstrates how you can access AWS services, such as Amazon S3 and Amazon Athena, using trusted identity p…☆13Mar 11, 2025Updated last year
- AWS Attack Path Management Tool - Walking on the Moon☆263Dec 5, 2024Updated last year
- Collection of samples for Management and Governance services☆69Mar 17, 2026Updated last month
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- This script automates the process of running the Security Hub multi-account workflow across a group of accounts that are in your control☆280Jan 23, 2026Updated 3 months ago
- Implements OPA-based preventive security controls for AWS Infrastructure using Terraform Infrastructure as Code (IaC), that can establish…☆51Dec 6, 2023Updated 2 years ago
- Identify all permitted data paths originating from the Internet to Network Interfaces within AWS Accounts across the entire AWS Organizat…☆42Sep 19, 2023Updated 2 years ago
- This repository contains a sample IAM permissions boundary as a starting point for creating your own permissions boundary to meet the s…☆92Feb 21, 2025Updated last year
- ASH is an extensible, open source SAST, SCA, and IaC security scanner orchestration engine.☆643Updated this week
- Terraform module for creating a simple private serverless Terraform registry in AWS☆15Oct 14, 2024Updated last year
- ☆22Oct 18, 2023Updated 2 years ago