Example AWS Resource control policies to get started or mature your usage of AWS RCPs.
☆198Feb 26, 2026Updated this week
Alternatives and similar repositories for resource-control-policy-examples
Users that are interested in resource-control-policy-examples are comparing it to the libraries listed below
Sorting:
- Example AWS Service control policies to get started or mature your usage of AWS SCPs.☆285Feb 13, 2026Updated 2 weeks ago
- This Terraform module consists of the configuration for automating the remediation of AWS EC2 vulnerabilities using AWS Inspector finding…☆50Jul 4, 2025Updated 7 months ago
- Safer AWS SCP deployments via real-time monitoring☆56Sep 30, 2023Updated 2 years ago
- KYE: Know Your Enemies - Check external access on your AWS account☆129Apr 25, 2025Updated 10 months ago
- ☆32Apr 1, 2025Updated 11 months ago
- Optimize long AWS IAM policies by strategically using wildcards, reducing the number of characters, and maintaining the intended scope of…☆15Nov 14, 2024Updated last year
- Data perimeter helper is a tool that helps you design and anticipate the impact of your data perimeter controls☆17Jan 21, 2026Updated last month
- Repository to archive AWS Documentation for local use☆50Oct 14, 2024Updated last year
- Scalable integrity framework for ABAC on AWS☆56Mar 14, 2025Updated 11 months ago
- ☆18Jul 30, 2024Updated last year
- SCP management tool☆135Oct 23, 2023Updated 2 years ago
- Collection of semi-useful Service Control Policies and scripts to manage them☆102Feb 1, 2025Updated last year
- Guidance for Organization on AWS☆12Nov 26, 2025Updated 3 months ago
- Runs IAM policy linting and security checks against either a single AWS account or multiple member accounts of an AWS Organization.☆152Dec 21, 2025Updated 2 months ago
- A collection of documented and undocumented AWS API models☆53Nov 21, 2025Updated 3 months ago
- ☆28Dec 26, 2025Updated 2 months ago
- A simple threat modeling tool to help humans to reduce time-to-value when threat modeling☆680Updated this week
- Official code for the paper entitled "Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense"☆15Apr 10, 2025Updated 10 months ago
- ☆46Nov 7, 2024Updated last year
- ☆14Jan 8, 2026Updated last month
- ☆40Aug 2, 2024Updated last year
- Example policies demonstrating how to implement a data perimeter on AWS.☆193Jan 29, 2026Updated last month
- A solution designed to simplify AWS Identity Center (SSO) management using simple JSON/YAML inputs.☆16Jul 31, 2025Updated 7 months ago
- ☆16Feb 10, 2025Updated last year
- List of known AWS accounts☆254Feb 6, 2026Updated 3 weeks ago
- Crowdsourced list of sensitive IAM Actions☆159Oct 29, 2024Updated last year
- This solutions facilitates rapid deployment of Prowler, full AWS Organization analysis, and finding processing as part of a security post…☆61Jun 2, 2025Updated 9 months ago
- Building a CloudWatch Dashboard for Lambdas to visualize the Invocations, Concurrent Executions, Duration, and Errors using CDK☆17Jul 9, 2023Updated 2 years ago
- ☆18Sep 10, 2025Updated 5 months ago
- Enhance the security of your web applications effortlessly with AWS Firewall Factory. Safeguard your valuable assets through seamless WAF…☆254Nov 17, 2025Updated 3 months ago
- Sample Generative AI tool for evaluating Infrastructure as Code and architecture diagrams against AWS Well-Architected best practices.☆455Updated this week
- Bare minimum AWS Security Alerting and Secure by default Configuration☆513May 15, 2025Updated 9 months ago
- Collection of example Service Control Policies (SCPs) that are useful for sandbox and training AWS accounts.☆161Dec 22, 2025Updated 2 months ago
- Repository to archive GCP Documentation for local use☆16Feb 11, 2025Updated last year
- Cloud Commotion intends to cause chaos to simulate security incidents☆145Jun 18, 2024Updated last year
- Automated Security Response on AWS is an add-on solution that works with AWS Security Hub to provide a ready-to-deploy architecture and a…☆464Updated this week
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆142Jan 2, 2025Updated last year
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆23Aug 30, 2024Updated last year
- ☆18Feb 2, 2026Updated last month