This repository contains a sample IAM permissions boundary as a starting point for creating your own permissions boundary to meet the security needs of your organization. The IAM permissions boundary sample, when attached to an IAM role, allow it to perform all expected workload tasks without being able to modify the security of its environmen…
☆92Feb 21, 2025Updated last year
Alternatives and similar repositories for example-permissions-boundary
Users that are interested in example-permissions-boundary are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Example AWS Service control policies to get started or mature your usage of AWS SCPs.☆300Apr 9, 2026Updated 3 weeks ago
- ☆39Oct 24, 2025Updated 6 months ago
- A solution designed to simplify AWS Identity Center (SSO) management using simple JSON/YAML inputs.☆16Apr 10, 2026Updated 3 weeks ago
- ☆16May 28, 2025Updated 11 months ago
- Listing of resources for example AWS Service Control Policies (SCPs)☆16Jan 10, 2024Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆37Mar 27, 2026Updated last month
- A PoC to Simulate Ransomware Attack on AWS Environment☆33Oct 14, 2024Updated last year
- ☆21Apr 1, 2026Updated last month
- This sample repositories provides an production ready example of enhancing AWS SSO for enterprise usage. We provide an automation for ass…☆16Jul 8, 2025Updated 9 months ago
- Typical use cases of opensearch serverelss: search, time-series, kinesis firehose integration, securing with VPC☆19Mar 26, 2026Updated last month
- ☆12Oct 17, 2023Updated 2 years ago
- AWS I&A Terraform Module Standards☆19Dec 5, 2023Updated 2 years ago
- ☆19Sep 10, 2025Updated 7 months ago
- ☆22Apr 17, 2023Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- This project provides a solution to AWS customers for reporting on what tags exists, the resources they are applied to, and what resource…☆25Feb 28, 2024Updated 2 years ago
- Automated Security Response on AWS is an add-on solution that works with AWS Security Hub to provide a ready-to-deploy architecture and a…☆473Apr 21, 2026Updated last week
- Go library for mapping IP address ranges to cloud provider regions (currently: AWS and GCP)☆24Updated this week
- This implementation demonstrates the AWS Identity and Access Management (IAM) Access Analyzer policy validation capability. Learn how to …☆24Jun 16, 2022Updated 3 years ago
- Example policies demonstrating how to implement a data perimeter on AWS.☆203Apr 20, 2026Updated last week
- AWS Quick Start Team☆17Oct 3, 2024Updated last year
- This repository provides sample templates for security playbooks against various scenarios when using Amazon Web Services.☆654Updated this week
- Runs IAM policy linting and security checks against either a single AWS account or multiple member accounts of an AWS Organization.☆152Dec 21, 2025Updated 4 months ago
- TrailAlerts is a AWS-native, serverless cloud-detection tool that lets you define simple rules as code and get rich alerts about events i…☆52Apr 5, 2026Updated 3 weeks ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆17Jul 7, 2022Updated 3 years ago
- Terraform module to perform security assessment in AWS Organizations using Prowler on AWS Fargate.☆16Oct 5, 2023Updated 2 years ago
- A catalog of services that can be publicly exposed within different cloud providers.☆14Aug 30, 2024Updated last year
- Example solutions demonstrating how to implement patterns within the AWS Security Reference Architecture guide using CloudFormation (incl…☆1,127Mar 10, 2026Updated last month
- Crowdsourced list of sensitive IAM Actions☆159Oct 29, 2024Updated last year
- ☆24Jul 20, 2023Updated 2 years ago
- ☆22Oct 18, 2023Updated 2 years ago
- Unauthenticated enumeration of AWS, Azure, and GCP Principals☆286Nov 27, 2025Updated 5 months ago
- ☆30May 13, 2025Updated 11 months ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆24Feb 21, 2025Updated last year
- ☆146Apr 7, 2026Updated 3 weeks ago
- Expand IAM Actions with Wildcards☆34Updated this week
- A Python script to discover AWS IAM identities (users and roles) with specified access to specified resources.☆14May 16, 2022Updated 3 years ago
- Terraform module to setup and manage various components of the AWS Landing Zone.☆42Apr 17, 2026Updated 2 weeks ago
- ☆10Jun 6, 2017Updated 8 years ago
- A simple threat modeling tool to help humans to reduce time-to-value when threat modeling☆705Apr 23, 2026Updated last week