aws-samples / minimum-eks-devsecops-with-monitoring-optionsLinks
Minimum DevSecOps with Monitoring Options on Amazon EKS
☆12Updated 6 months ago
Alternatives and similar repositories for minimum-eks-devsecops-with-monitoring-options
Users that are interested in minimum-eks-devsecops-with-monitoring-options are comparing it to the libraries listed below
Sorting:
- This package provides an easy way to create a refreshable boto3 Session with AWS Roles Anywhere.☆59Updated 5 months ago
- ☆21Updated 2 years ago
- ☆21Updated 2 years ago
- A cloud security tool to search and clean up unused AWS access keys, written in Go.☆51Updated 3 years ago
- ☆35Updated 2 weeks ago
- The Amazon Elastic Kubernetes Service (EKS) Creation Engine (ECE) is a Python command-line program created by the Lightspin Office of the…☆41Updated 2 years ago
- ☆41Updated 3 months ago
- Make AWS IAM policies smaller by adding wildcards to actions.☆19Updated last week
- A Solution for AWS Resource Tagging Automation☆51Updated 2 months ago
- Collect IAM information from all your AWS organization, accounts, and resources.☆75Updated this week
- ☆37Updated last year
- AWS SSO Reporter☆55Updated 6 months ago
- Runs IAM policy linting and security checks against either a single AWS account or multiple member accounts of an AWS Organization.☆150Updated 2 months ago
- Configure and deploy AWS Security Hub.☆16Updated 2 years ago
- ☆20Updated 11 months ago
- ☆33Updated 2 years ago
- ☆34Updated 2 years ago
- SCP management tool☆134Updated 2 years ago
- Host Internal Static Website on AWS☆17Updated last year
- Awesome AWS service control policies (SCPs), Resource Control Policies (RCPs), and other organizational policies☆30Updated 6 months ago
- Utility for collecting resource-based policies from AWS☆23Updated 3 years ago
- This is a sample solution that demonstrates how to use AWS IAM Identity Center with Neptune to visualize and map relationships between id…☆26Updated 3 months ago
- This solutions facilitates rapid deployment of Prowler, full AWS Organization analysis, and finding processing as part of a security post…☆62Updated 5 months ago
- ☆23Updated 2 years ago
- Solution to setup a recurring Security Hub CSV full report with email notification to provide detailed report of the security posture.☆22Updated 7 months ago
- ☆12Updated 2 years ago
- ☆42Updated last year
- Hands-on workshop on how to build security automation in pipelines☆37Updated last year
- KYE: Know Your Enemies - Check external access on your AWS account☆126Updated 6 months ago
- ☆39Updated 4 years ago