This repository contains a sample IAM permissions boundary as a starting point for creating your own permissions boundary to meet the security needs of your organization. The IAM permissions boundary sample, when attached to an IAM role, allow it to perform all expected workload tasks without being able to modify the security of its environmen…
☆90Feb 21, 2025Updated last year
Alternatives and similar repositories for example-permissions-boundary
Users that are interested in example-permissions-boundary are comparing it to the libraries listed below
Sorting:
- Example AWS Service control policies to get started or mature your usage of AWS SCPs.☆285Feb 13, 2026Updated 2 weeks ago
- A PoC to Simulate Ransomware Attack on AWS Environment☆33Oct 14, 2024Updated last year
- ☆39Oct 24, 2025Updated 4 months ago
- ☆16May 28, 2025Updated 9 months ago
- A solution designed to simplify AWS Identity Center (SSO) management using simple JSON/YAML inputs.☆16Jul 31, 2025Updated 7 months ago
- Listing of resources for example AWS Service Control Policies (SCPs)☆17Jan 10, 2024Updated 2 years ago
- ☆37Apr 9, 2025Updated 10 months ago
- AWS I&A Terraform Module Standards☆19Dec 5, 2023Updated 2 years ago
- Typical use cases of opensearch serverelss: search, time-series, kinesis firehose integration, securing with VPC☆19Jun 10, 2025Updated 8 months ago
- This sample repositories provides an production ready example of enhancing AWS SSO for enterprise usage. We provide an automation for ass…☆16Jul 8, 2025Updated 7 months ago
- This project provides a solution to AWS customers for reporting on what tags exists, the resources they are applied to, and what resource…☆25Feb 28, 2024Updated 2 years ago
- Automated Security Response on AWS is an add-on solution that works with AWS Security Hub to provide a ready-to-deploy architecture and a…☆464Updated this week
- Unauthenticated enumeration of AWS, Azure, and GCP Principals☆283Nov 27, 2025Updated 3 months ago
- This repository provides sample templates for security playbooks against various scenarios when using Amazon Web Services.☆649Feb 22, 2026Updated last week
- A Python CLI application that demonstrates how you can access AWS services, such as Amazon S3 and Amazon Athena, using trusted identity p…☆12Mar 11, 2025Updated 11 months ago
- ☆21Feb 11, 2026Updated 2 weeks ago
- ☆22Oct 18, 2023Updated 2 years ago
- An async rust-sdk to interact with https://aiven.io/☆11Mar 13, 2023Updated 2 years ago
- ☆12Oct 17, 2023Updated 2 years ago
- eBPF container escape detector prototype | Kernel 6.8+ | Early dev phase | Expect kernel panics ⚠️☆11Mar 18, 2025Updated 11 months ago
- This solution will help you automate user group assignment to permission sets in AWS IAM Identity center for accessing any or all AWS acc…☆25Mar 24, 2025Updated 11 months ago
- Example solutions demonstrating how to implement patterns within the AWS Security Reference Architecture guide using CloudFormation (incl…☆1,119Dec 12, 2025Updated 2 months ago
- Convert cloudtrail data to MITRE ATT&CK Sightings☆82Jul 25, 2022Updated 3 years ago
- Crowdsourced list of sensitive IAM Actions☆159Oct 29, 2024Updated last year
- To clean up your AWS AMIs: First, include AMIs by name or tag. Second, exclude AMIs in use, younger than N days, or the newest N images. …☆36Updated this week
- ☆14Feb 2, 2021Updated 5 years ago
- A Python script to discover AWS IAM identities (users and roles) with specified access to specified resources.☆14May 16, 2022Updated 3 years ago
- Terraform module to set up alerts detecting manual actions using SNS. Monitors EKS Audit Logs and notifies subscribed operators when manu…☆11Jan 1, 2024Updated 2 years ago
- Terraform module to perform security assessment in AWS Organizations using Prowler on AWS Fargate.☆15Oct 5, 2023Updated 2 years ago
- Simple tool to identify and remediate the use of the AWS EC2 IMDSv1.☆15Aug 12, 2021Updated 4 years ago
- This application was built to help reduce the amount of time it takes to review AWS Lambda code.☆61Nov 11, 2024Updated last year
- Expand IAM Actions with Wildcards☆34Updated this week
- ☆17Jul 7, 2022Updated 3 years ago
- ☆15Feb 2, 2023Updated 3 years ago
- Data perimeter helper is a tool that helps you design and anticipate the impact of your data perimeter controls☆17Jan 21, 2026Updated last month
- This project automates setup of Cost and Usage Reports (CUR) in a billing account with an Athena table enabling querying of the latest da…☆12Updated this week
- Validate native AWS security services are properly configured across your AWS Organization☆64Feb 6, 2026Updated 3 weeks ago
- AWS CDK construct for rotating IAM user credentials and sending to a third party☆17Aug 28, 2022Updated 3 years ago
- How to hydrate Kinesis DLQs records☆13Dec 11, 2023Updated 2 years ago