aws-samples / devsecops-cicdLinks
☆94Updated 6 months ago
Alternatives and similar repositories for devsecops-cicd
Users that are interested in devsecops-cicd are comparing it to the libraries listed below
Sorting:
- ☆55Updated 2 years ago
- ☆64Updated 4 years ago
- Quickly set up a ready to use development environment integrated with a multi-account CI/CD pipeline following security and DevOps best p…☆50Updated 2 years ago
- Example AWS Resource control policies to get started or mature your usage of AWS RCPs.☆195Updated 3 weeks ago
- Advanced AWS Security Automation Resources: Used by Udemy Course 🎓☆45Updated 3 years ago
- This repository includes a collection of solutions and tools for the AWS Elastic Disaster Recovery (DRS) service. You can use one or all …☆29Updated 11 months ago
- Hands-on workshop on how to build security automation in pipelines☆37Updated last year
- Sample DevSecOps pipelines (heavily biased on the "Sec") for various stacks and tools using open-source security tools and AWS native ser…☆72Updated 4 years ago
- Example AWS Service control policies to get started or mature your usage of AWS SCPs.☆275Updated this week
- ☆34Updated 3 years ago
- Uses the AWS Cloud Control API to list resources that are present in a given AWS account and region(s). Discovered resources are written …☆182Updated 3 weeks ago
- Mindmaps about AWS based on public information☆133Updated 3 years ago
- Assisted Log Enabler for AWS - Find AWS resources that are not logging, and turn them on.☆268Updated this week
- Enhance the security of your web applications effortlessly with AWS Firewall Factory. Safeguard your valuable assets through seamless WAF…☆254Updated 2 months ago
- This solutions facilitates rapid deployment of Prowler, full AWS Organization analysis, and finding processing as part of a security post…☆61Updated 7 months ago
- A Workshop for AWS Security Hub Integration, Prioritization, and Response☆73Updated 2 years ago
- A Solution for AWS Resource Tagging Automation☆53Updated 2 months ago
- ASH is an extensible, open source SAST, SCA, and IaC security scanner orchestration engine.☆543Updated this week
- This repository contains a sample IAM permissions boundary as a starting point for creating your own permissions boundary to meet the s…☆91Updated 10 months ago
- This repository describes how to use AWS Control Tower controls, HashiCorp Terraform, and infrastructure as code (IaC) to implement and a…☆105Updated 9 months ago
- Create custom auto-remediation solutions using serverless functions in the cloud.☆55Updated 2 years ago
- AWS IAM Permissions Guardrails https://aws-samples.github.io/aws-iam-permissions-guardrails/☆126Updated 2 years ago
- ☆20Updated last year
- This set of CloudFormation templates and Python scripts will set up an auto-rotation function that will automatically rotate your AWS IAM…☆146Updated 10 months ago
- Automated Security Response on AWS is an add-on solution that works with AWS Security Hub to provide a ready-to-deploy architecture and a…☆456Updated this week
- ☆35Updated 2 years ago
- Best practices for hardening your AWS account, most of them are free☆35Updated 2 years ago
- ☆163Updated 2 weeks ago
- AWS Auto Inventory allows you to quickly and easily generate inventory reports of your AWS resources.☆247Updated last week
- Code examples for the AWS Security Blog post: How to use CI/CD to deploy and configure AWS security services with Terraform☆97Updated 4 years ago