aws-samples / example-permissions-boundaryLinks
This repository contains a sample IAM permissions boundary as a starting point for creating your own permissions boundary to meet the security needs of your organization. The IAM permissions boundary sample, when attached to an IAM role, allow it to perform all expected workload tasks without being able to modify the security of its environmen…
☆90Updated 9 months ago
Alternatives and similar repositories for example-permissions-boundary
Users that are interested in example-permissions-boundary are comparing it to the libraries listed below
Sorting:
- Example policies demonstrating how to implement a data perimeter on AWS.☆188Updated last week
- SCP management tool☆134Updated 2 years ago
- Example AWS Service control policies to get started or mature your usage of AWS SCPs.☆268Updated last month
- AWS IAM Permissions Guardrails https://aws-samples.github.io/aws-iam-permissions-guardrails/☆126Updated 2 years ago
- Collection of example Service Control Policies (SCPs) that are useful for sandbox and training AWS accounts.☆155Updated 5 months ago
- Runs IAM policy linting and security checks against either a single AWS account or multiple member accounts of an AWS Organization.☆151Updated 3 months ago
- Collection of semi-useful Service Control Policies and scripts to manage them☆101Updated 10 months ago
- Collection of samples for Management and Governance services☆69Updated 2 weeks ago
- ☆144Updated last year
- ☆34Updated 3 years ago
- This solution supports a bidirectional integration between Security Hub and JIRA. Issues can be either created automatically or manually …☆42Updated last year
- This solutions facilitates rapid deployment of Prowler, full AWS Organization analysis, and finding processing as part of a security post…☆62Updated 6 months ago
- Crowdsourced list of sensitive IAM Actions☆156Updated last year
- AWS Tagging policy and naming convention for all resources created within any AWS accounts under the AWS Master Account.☆133Updated 6 years ago
- Kickstart and manage your AWS Organization via Terraform☆113Updated 2 weeks ago
- A Workshop for AWS Security Hub Integration, Prioritization, and Response☆73Updated 2 years ago
- ☆92Updated 6 months ago
- Allow users to request temporary elevated access to your AWS environment☆130Updated 2 years ago
- Example AWS Resource control policies to get started or mature your usage of AWS RCPs.☆193Updated last month
- Accelerate AWS IAM Identity Center (successor to AWS Single Sign-On (SSO)) implementation using AWS CDK. This CDK program allows you to c…☆35Updated 2 years ago
- Uses the AWS Cloud Control API to list resources that are present in a given AWS account and region(s). Discovered resources are written …☆179Updated 6 months ago
- aws-solutions-library-samples / guidance-for-cross-network-traffic-inspection-with-aws-network-firewallThis Guidance demonstrates how to automate the deployment of centralized network security infrastructure that inspects and filters traffi…☆44Updated 2 weeks ago
- Automated AWS Organizations configuration for security operations☆37Updated 9 months ago
- ☆141Updated 2 months ago
- Implements OPA-based preventive security controls for AWS Infrastructure using Terraform Infrastructure as Code (IaC), that can establish…☆43Updated last year
- ☆143Updated last week
- AWS Config resource schema define the properties and types of AWS Config resource configuration items (CIs). Resource CI schema are used …☆258Updated 8 months ago
- This solution is intended for enterprises that need a streamlined way of managing user access to their AWS accounts. Using this solution,…☆72Updated 8 months ago
- AWS STS Network Query Tool uses cross account roles to collect networking related information for multiple accounts and outputs a CSV.☆26Updated last year
- ☆57Updated 2 years ago