This repository contains a sample IAM permissions boundary as a starting point for creating your own permissions boundary to meet the security needs of your organization. The IAM permissions boundary sample, when attached to an IAM role, allow it to perform all expected workload tasks without being able to modify the security of its environmen…
☆93Feb 21, 2025Updated last year
Alternatives and similar repositories for example-permissions-boundary
Users that are interested in example-permissions-boundary are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Example AWS Service control policies to get started or mature your usage of AWS SCPs.☆302May 11, 2026Updated last week
- ☆39Oct 24, 2025Updated 6 months ago
- A solution designed to simplify AWS Identity Center (SSO) management using simple JSON/YAML inputs.☆16Apr 10, 2026Updated last month
- ☆16May 28, 2025Updated 11 months ago
- Listing of resources for example AWS Service Control Policies (SCPs)☆16Jan 10, 2024Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆37Mar 27, 2026Updated last month
- A PoC to Simulate Ransomware Attack on AWS Environment☆33Oct 14, 2024Updated last year
- ☆21Apr 1, 2026Updated last month
- This sample repositories provides an production ready example of enhancing AWS SSO for enterprise usage. We provide an automation for ass…☆16Jul 8, 2025Updated 10 months ago
- Typical use cases of opensearch serverelss: search, time-series, kinesis firehose integration, securing with VPC☆19Mar 26, 2026Updated last month
- ☆12Oct 17, 2023Updated 2 years ago
- ☆19Sep 10, 2025Updated 8 months ago
- ☆22Apr 17, 2023Updated 3 years ago
- This project provides a solution to AWS customers for reporting on what tags exists, the resources they are applied to, and what resource…☆25Feb 28, 2024Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Automated Security Response on AWS is an add-on solution that works with AWS Security Hub to provide a ready-to-deploy architecture and a…☆472Updated this week
- Go library for mapping IP address ranges to cloud provider regions (currently: AWS and GCP)☆24Updated this week
- This implementation demonstrates the AWS Identity and Access Management (IAM) Access Analyzer policy validation capability. Learn how to …☆24Jun 16, 2022Updated 3 years ago
- Example policies demonstrating how to implement a data perimeter on AWS.☆204Apr 28, 2026Updated 3 weeks ago
- AWS Quick Start Team☆17Oct 3, 2024Updated last year
- This repository provides sample templates for security playbooks against various scenarios when using Amazon Web Services.☆656May 14, 2026Updated last week
- Runs IAM policy linting and security checks against either a single AWS account or multiple member accounts of an AWS Organization.☆152May 3, 2026Updated 2 weeks ago
- TrailAlerts is a AWS-native, serverless cloud-detection tool that lets you define simple rules as code and get rich alerts about events i…☆52May 2, 2026Updated 2 weeks ago
- ☆17Jul 7, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Terraform module to perform security assessment in AWS Organizations using Prowler on AWS Fargate.☆16Oct 5, 2023Updated 2 years ago
- A catalog of services that can be publicly exposed within different cloud providers.☆14Aug 30, 2024Updated last year
- Example solutions demonstrating how to implement patterns within the AWS Security Reference Architecture guide using CloudFormation (incl…☆1,131Mar 10, 2026Updated 2 months ago
- Crowdsourced list of sensitive IAM Actions☆159Oct 29, 2024Updated last year
- ☆14Feb 2, 2021Updated 5 years ago
- ☆24Jul 20, 2023Updated 2 years ago
- ☆22Oct 18, 2023Updated 2 years ago
- Unauthenticated enumeration of AWS, Azure, and GCP Principals☆289Nov 27, 2025Updated 5 months ago
- ☆32May 13, 2025Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆24Feb 21, 2025Updated last year
- ☆146Apr 7, 2026Updated last month
- Expand IAM Actions with Wildcards☆35Updated this week
- A Python script to discover AWS IAM identities (users and roles) with specified access to specified resources.☆14May 16, 2022Updated 4 years ago
- Terraform module to setup and manage various components of the AWS Landing Zone.☆42May 11, 2026Updated last week
- ☆10Jun 6, 2017Updated 8 years ago
- A simple threat modeling tool to help humans to reduce time-to-value when threat modeling☆714May 14, 2026Updated last week