aws-samples / resource-tagging-automationLinks
A Lambda function for Resource Tagging Automation
☆51Updated 9 months ago
Alternatives and similar repositories for resource-tagging-automation
Users that are interested in resource-tagging-automation are comparing it to the libraries listed below
Sorting:
- ☆34Updated 3 years ago
- Collection of samples for Management and Governance services☆68Updated last month
- ☆88Updated 2 weeks ago
- Hands-on workshop on how to build security automation in pipelines☆37Updated last year
- Sample CloudFormation templates and architecture for AWS Control Tower☆29Updated last year
- ☆57Updated last year
- Account Assessment for AWS Organizations programmatically scans all AWS accounts in an AWS Organization for identity-based and resource-b…☆38Updated last week
- Implement backup and recovery with AWS Backup across your AWS Organizations using a CI/CD pipeline (AWS CodePipeline).☆36Updated 6 months ago
- This repository contains a sample IAM permissions boundary as a starting point for creating your own permissions boundary to meet the s…☆78Updated 3 months ago
- Automated AWS account hardening with AWS Control Tower and AWS Step Functions☆37Updated 3 months ago
- AWS CloudFormation templates and Python code for AWS blog post on how to automate centralized backup at scale across AWS services using A…☆35Updated last year
- AWS IAM Permissions Guardrails https://aws-samples.github.io/aws-iam-permissions-guardrails/☆124Updated 2 years ago
- This project provides a solution to AWS customers for reporting on what tags exists, the resources they are applied to, and what resource…☆21Updated last year
- This package provides an easy way to create a refreshable boto3 Session with AWS Roles Anywhere.☆57Updated 3 weeks ago
- Sample code for integrating AWS CloudFormation templates security tests (using CFN-Nag and CFN-Guard) with both AWS Security Hub and AWS …☆24Updated last year
- A Workshop for AWS Security Hub Integration, Prioritization, and Response☆71Updated last year
- Automated AWS Organizations configuration for security operations☆36Updated 3 months ago
- Best practices for hardening your AWS account, most of them are free☆36Updated last year
- Centralized Network Inspection on AWS configures the AWS resources needed to filter network traffic. This solution saves you time by auto…☆43Updated 2 months ago
- ☆20Updated 2 years ago
- A CLI tool for building simple to complex IAM policies☆70Updated last year
- Example policies demonstrating how to implement a data perimeter on AWS.☆156Updated 2 weeks ago
- ☆32Updated 6 months ago
- This solution supports a bidirectional integration between Security Hub and JIRA. Issues can be either created automatically or manually …☆38Updated 10 months ago
- To clean up your AWS AMIs: First, include AMIs by name or tag. Second, exclude AMIs in use, younger than N days, or the newest N images. …☆34Updated last month
- Export / Import your AWS Organizational Structure and Policies - Attach & Validate your SCPs☆26Updated last year
- The Amazon Web Services (AWS) Config Resource Compliance Dashboard (CRCD) shows the inventory of your AWS resources, along with their com…☆22Updated last week
- ☆35Updated last year
- This solution will help you automate user group assignment to permission sets in AWS IAM Identity center for accessing any or all AWS acc…☆25Updated 2 months ago
- This solutions facilitates rapid deployment of Prowler, full AWS Organization analysis, and finding processing as part of a security post…☆58Updated 6 months ago