This repository contains a sample IAM permissions boundary as a starting point for creating your own permissions boundary to meet the security needs of your organization. The IAM permissions boundary sample, when attached to an IAM role, allow it to perform all expected workload tasks without being able to modify the security of its environmen…
☆90Feb 21, 2025Updated last year
Alternatives and similar repositories for example-permissions-boundary
Users that are interested in example-permissions-boundary are comparing it to the libraries listed below
Sorting:
- Example AWS Service control policies to get started or mature your usage of AWS SCPs.☆287Mar 13, 2026Updated last week
- ☆39Oct 24, 2025Updated 4 months ago
- A solution designed to simplify AWS Identity Center (SSO) management using simple JSON/YAML inputs.☆16Jul 31, 2025Updated 7 months ago
- ☆16May 28, 2025Updated 9 months ago
- Listing of resources for example AWS Service Control Policies (SCPs)☆16Jan 10, 2024Updated 2 years ago
- ☆37Apr 9, 2025Updated 11 months ago
- ☆21Feb 11, 2026Updated last month
- This sample repositories provides an production ready example of enhancing AWS SSO for enterprise usage. We provide an automation for ass…☆16Jul 8, 2025Updated 8 months ago
- Typical use cases of opensearch serverelss: search, time-series, kinesis firehose integration, securing with VPC☆19Jun 10, 2025Updated 9 months ago
- ☆12Oct 17, 2023Updated 2 years ago
- AWS I&A Terraform Module Standards☆19Dec 5, 2023Updated 2 years ago
- ☆18Sep 10, 2025Updated 6 months ago
- ☆21Apr 17, 2023Updated 2 years ago
- This project provides a solution to AWS customers for reporting on what tags exists, the resources they are applied to, and what resource…☆25Feb 28, 2024Updated 2 years ago
- Automated Security Response on AWS is an add-on solution that works with AWS Security Hub to provide a ready-to-deploy architecture and a…☆466Mar 13, 2026Updated last week
- Go library for mapping IP address ranges to cloud provider regions (currently: AWS and GCP)☆23Updated this week
- This implementation demonstrates the AWS Identity and Access Management (IAM) Access Analyzer policy validation capability. Learn how to …☆24Jun 16, 2022Updated 3 years ago
- AWS Quick Start Team☆17Oct 3, 2024Updated last year
- Runs IAM policy linting and security checks against either a single AWS account or multiple member accounts of an AWS Organization.☆152Dec 21, 2025Updated 3 months ago
- TrailAlerts is a AWS-native, serverless cloud-detection tool that lets you define simple rules as code and get rich alerts about events i…☆51Nov 9, 2025Updated 4 months ago
- ☆17Jul 7, 2022Updated 3 years ago
- Terraform module to perform security assessment in AWS Organizations using Prowler on AWS Fargate.☆16Oct 5, 2023Updated 2 years ago
- A catalog of services that can be publicly exposed within different cloud providers.☆14Aug 30, 2024Updated last year
- Example solutions demonstrating how to implement patterns within the AWS Security Reference Architecture guide using CloudFormation (incl…☆1,122Mar 10, 2026Updated last week
- ☆14Feb 2, 2021Updated 5 years ago
- Crowdsourced list of sensitive IAM Actions☆159Oct 29, 2024Updated last year
- ☆24Jul 20, 2023Updated 2 years ago
- ☆22Oct 18, 2023Updated 2 years ago
- Unauthenticated enumeration of AWS, Azure, and GCP Principals☆283Nov 27, 2025Updated 3 months ago
- A Python CLI application that demonstrates how you can access AWS services, such as Amazon S3 and Amazon Athena, using trusted identity p…☆12Mar 11, 2025Updated last year
- ☆24Feb 21, 2025Updated last year
- ☆143Feb 27, 2026Updated 3 weeks ago
- Expand IAM Actions with Wildcards☆35Mar 14, 2026Updated last week
- A Python script to discover AWS IAM identities (users and roles) with specified access to specified resources.☆14May 16, 2022Updated 3 years ago
- Example policies demonstrating how to implement a data perimeter on AWS.☆194Mar 9, 2026Updated last week
- Terraform module to setup and manage various components of the AWS Landing Zone.☆42Nov 13, 2025Updated 4 months ago
- ☆10Jun 6, 2017Updated 8 years ago
- A simple threat modeling tool to help humans to reduce time-to-value when threat modeling☆688Updated this week
- Automated AWS Organizations configuration for security operations☆38Feb 24, 2025Updated last year