aws-samples / example-permissions-boundaryLinks
This repository contains a sample IAM permissions boundary as a starting point for creating your own permissions boundary to meet the security needs of your organization. The IAM permissions boundary sample, when attached to an IAM role, allow it to perform all expected workload tasks without being able to modify the security of its environmen…
☆83Updated 5 months ago
Alternatives and similar repositories for example-permissions-boundary
Users that are interested in example-permissions-boundary are comparing it to the libraries listed below
Sorting:
- Example policies demonstrating how to implement a data perimeter on AWS.☆174Updated 3 weeks ago
- SCP management tool☆132Updated last year
- AWS IAM Permissions Guardrails https://aws-samples.github.io/aws-iam-permissions-guardrails/☆125Updated 2 years ago
- Example AWS Service control policies to get started or mature your usage of AWS SCPs.☆248Updated 3 weeks ago
- Runs IAM policy linting and security checks against either a single AWS account or a set of member accounts of an AWS Organization.☆146Updated 2 weeks ago
- Collection of example Service Control Policies (SCPs) that are useful for sandbox and training AWS accounts.☆153Updated last month
- Collection of semi-useful Service Control Policies and scripts to manage them☆99Updated 6 months ago
- ☆140Updated last year
- This solution supports a bidirectional integration between Security Hub and JIRA. Issues can be either created automatically or manually …☆41Updated last year
- Uses the AWS Cloud Control API to list resources that are present in a given AWS account and region(s). Discovered resources are written …☆175Updated 2 months ago
- ☆34Updated 3 years ago
- This solutions facilitates rapid deployment of Prowler, full AWS Organization analysis, and finding processing as part of a security post…☆59Updated last month
- The Network Orchestration for AWS Transit Gateway solution automates the process of setting up and managing transit networks in distribut…☆139Updated 2 weeks ago
- ☆138Updated 4 months ago
- Crowdsourced list of sensitive IAM Actions☆152Updated 9 months ago
- Allow users to request temporary elevated access to your AWS environment☆129Updated last year
- Collection of samples for Management and Governance services☆68Updated 3 months ago
- ☆89Updated 2 months ago
- Kickstart and manage your AWS Organization via Terraform☆103Updated last month
- Implements OPA-based preventive security controls for AWS Infrastructure using Terraform Infrastructure as Code (IaC), that can establish…☆42Updated last year
- Example AWS Resource control policies to get started or mature your usage of AWS RCPs.☆187Updated 4 months ago
- ☆141Updated 2 months ago
- Terraform module for serverless certificate authority on AWS☆148Updated this week
- AWS Organizations Service Control Policies (SCPs) written in HashiCorp Terraform.☆243Updated 9 months ago
- AWS Config resource schema define the properties and types of AWS Config resource configuration items (CIs). Resource CI schema are used …☆255Updated 4 months ago
- This repository demonstrates a scalable, segregated, secured AWS network hub for multi-account organizations using Terraform.☆100Updated last year
- Automated AWS Organizations configuration for security operations☆36Updated 5 months ago
- A Workshop for AWS Security Hub Integration, Prioritization, and Response☆72Updated last year
- Accelerate AWS IAM Identity Center (successor to AWS Single Sign-On (SSO)) implementation using AWS CDK. This CDK program allows you to c…☆34Updated 2 years ago
- AWS STS Network Query Tool uses cross account roles to collect networking related information for multiple accounts and outputs a CSV.☆25Updated last year