aws-samples / moving-to-a-zero-trust-architecture-in-aws
☆4Updated 5 months ago
Alternatives and similar repositories for moving-to-a-zero-trust-architecture-in-aws:
Users that are interested in moving-to-a-zero-trust-architecture-in-aws are comparing it to the libraries listed below
- ☆13Updated 9 months ago
- ☆11Updated 3 months ago
- ☆32Updated 8 months ago
- This solutions facilitates rapid deployment of Prowler, full AWS Organization analysis, and finding processing as part of a security post…☆55Updated 3 months ago
- ☆11Updated 9 months ago
- A simple python script to generate security hub scores within your AWS account.☆25Updated last year
- ☆27Updated 4 months ago
- ☆20Updated 2 years ago
- Hands-on workshop on how to build security automation in pipelines☆37Updated 11 months ago
- ☆24Updated last year
- AWS STS Network Query Tool uses cross account roles to collect networking related information for multiple accounts and outputs a CSV.☆25Updated last year
- ☆12Updated last month
- ☆29Updated last month
- ☆21Updated last year
- This implementation demonstrates the AWS Identity and Access Management (IAM) Access Analyzer policy validation capability. Learn how to …☆24Updated 2 years ago
- ☆9Updated 8 months ago
- This solution is intended for enterprises that need a streamlined way of managing user access to their AWS accounts. Using this solution,…☆67Updated this week
- A solution designed to simplify AWS Identity Center (SSO) management using simple JSON/YAML inputs.☆12Updated 2 months ago
- ☆15Updated 2 weeks ago
- This solution supports a bidirectional integration between Security Hub and JIRA. Issues can be either created automatically or manually …☆38Updated 7 months ago
- Workshop on how to implement automated remediations of findings submitted to AWS Security Hub leveraging an open source tool named Cloud …☆22Updated 3 years ago
- ☆41Updated last year
- ☆14Updated 4 months ago
- ☆12Updated 2 months ago
- Solution to setup a recurring Security Hub CSV full report with email notification to provide detailed report of the security posture.☆21Updated 2 weeks ago
- This solution will help you automate user group assignment to permission sets in AWS IAM Identity center for accessing any or all AWS acc…☆21Updated this week
- ☆29Updated 2 years ago
- A collection of useful queries that can be used to verify compliance/security across your AWS assets☆31Updated 5 years ago
- Detect AWS usage anomalies in near-real time using OpenSearch Anomaly Detection and CloudTrail for improved cost management and security☆30Updated 10 months ago
- Accelerate AWS IAM Identity Center (successor to AWS Single Sign-On (SSO)) implementation using AWS CDK. This CDK program allows you to c…☆27Updated 2 years ago