aws-samples / example-permissions-boundaryLinks
This repository contains a sample IAM permissions boundary as a starting point for creating your own permissions boundary to meet the security needs of your organization. The IAM permissions boundary sample, when attached to an IAM role, allow it to perform all expected workload tasks without being able to modify the security of its environmen…
☆84Updated 7 months ago
Alternatives and similar repositories for example-permissions-boundary
Users that are interested in example-permissions-boundary are comparing it to the libraries listed below
Sorting:
- Example policies demonstrating how to implement a data perimeter on AWS.☆181Updated 2 weeks ago
- SCP management tool☆134Updated last year
- Runs IAM policy linting and security checks against either a single AWS account or multiple member accounts of an AWS Organization.☆149Updated last month
- Example AWS Service control policies to get started or mature your usage of AWS SCPs.☆256Updated last week
- AWS IAM Permissions Guardrails https://aws-samples.github.io/aws-iam-permissions-guardrails/☆124Updated 2 years ago
- Collection of example Service Control Policies (SCPs) that are useful for sandbox and training AWS accounts.☆153Updated 3 months ago
- Collection of semi-useful Service Control Policies and scripts to manage them☆100Updated 8 months ago
- Uses the AWS Cloud Control API to list resources that are present in a given AWS account and region(s). Discovered resources are written …☆178Updated 4 months ago
- Example AWS Resource control policies to get started or mature your usage of AWS RCPs.☆189Updated 6 months ago
- ☆143Updated last year
- Collection of samples for Management and Governance services☆69Updated 5 months ago
- This solution supports a bidirectional integration between Security Hub and JIRA. Issues can be either created automatically or manually …☆41Updated last year
- Allow users to request temporary elevated access to your AWS environment☆129Updated last year
- ☆92Updated 4 months ago
- ☆141Updated 3 weeks ago
- Crowdsourced list of sensitive IAM Actions☆154Updated 11 months ago
- A Workshop for AWS Security Hub Integration, Prioritization, and Response☆72Updated last year
- ☆139Updated 6 months ago
- ☆34Updated 3 years ago
- Assisted Log Enabler for AWS - Find AWS resources that are not logging, and turn them on.☆263Updated last week
- This solutions facilitates rapid deployment of Prowler, full AWS Organization analysis, and finding processing as part of a security post…☆62Updated 3 months ago
- Accelerate AWS IAM Identity Center (successor to AWS Single Sign-On (SSO)) implementation using AWS CDK. This CDK program allows you to c…☆35Updated 2 years ago
- Terraform module for serverless certificate authority on AWS☆149Updated this week
- A Solution for AWS Resource Tagging Automation☆51Updated last month
- Repository for iamfast questions and issues☆175Updated 6 months ago
- A crowdsourced AWS IAM permissions reference.☆99Updated last month
- Automated AWS Organizations configuration for security operations☆37Updated 7 months ago
- ☆37Updated last year
- Rules Registry for Compliance Frameworks☆132Updated last year
- This solution is intended for enterprises that need a streamlined way of managing user access to their AWS accounts. Using this solution,…☆71Updated 6 months ago