aws-samples / resource-tagging-automationLinks
A Solution for AWS Resource Tagging Automation
☆53Updated 2 weeks ago
Alternatives and similar repositories for resource-tagging-automation
Users that are interested in resource-tagging-automation are comparing it to the libraries listed below
Sorting:
- ☆34Updated 3 years ago
- ☆92Updated this week
- Account Assessment for AWS Organizations programmatically scans all AWS accounts in an AWS Organization for identity-based and resource-b…☆41Updated this week
- Hands-on workshop on how to build security automation in pipelines☆37Updated last year
- Automated AWS account hardening with AWS Control Tower and AWS Step Functions☆38Updated 9 months ago
- A CLI tool for building simple to complex IAM policies☆70Updated 2 years ago
- Best practices for hardening your AWS account, most of them are free☆36Updated 2 years ago
- Collection of samples for Management and Governance services☆69Updated 2 weeks ago
- ☆57Updated 2 years ago
- This repository contains a sample IAM permissions boundary as a starting point for creating your own permissions boundary to meet the s…☆90Updated 9 months ago
- Sample CloudFormation templates and architecture for AWS Control Tower☆29Updated 2 years ago
- AWS IAM Permissions Guardrails https://aws-samples.github.io/aws-iam-permissions-guardrails/☆126Updated 2 years ago
- bash functions to help run aws-cli commands across roles in multiple accounts with MFA☆69Updated 5 years ago
- Sample code for integrating AWS CloudFormation templates security tests (using CFN-Nag and CFN-Guard) with both AWS Security Hub and AWS …☆24Updated last year
- ☆21Updated 2 years ago
- This solution is intended for enterprises that need a streamlined way of managing user access to their AWS accounts. Using this solution,…☆72Updated 8 months ago
- ☆141Updated 3 months ago
- A Workshop for AWS Security Hub Integration, Prioritization, and Response☆73Updated 2 years ago
- ☆43Updated last week
- This project provides a solution to AWS customers for reporting on what tags exists, the resources they are applied to, and what resource…☆24Updated last year
- Collection of semi-useful Service Control Policies and scripts to manage them☆101Updated 10 months ago
- Example policies demonstrating how to implement a data perimeter on AWS.☆188Updated 2 weeks ago
- SCP management tool☆134Updated 2 years ago
- L3 construct that can be used to quickly deploy a complete EC2 Image Builder Image Pipeline☆44Updated this week
- Automated AWS Organizations configuration for security operations☆37Updated 9 months ago
- Accelerate AWS IAM Identity Center (successor to AWS Single Sign-On (SSO)) implementation using AWS CDK. This CDK program allows you to c…☆35Updated 2 years ago
- This package provides an easy way to create a refreshable boto3 Session with AWS Roles Anywhere.☆59Updated 6 months ago
- AWS managed IAM policies☆128Updated 3 years ago
- Enhance the security of your web applications effortlessly with AWS Firewall Factory. Safeguard your valuable assets through seamless WAF…☆256Updated 2 weeks ago
- AWS Tagging policy and naming convention for all resources created within any AWS accounts under the AWS Master Account.☆133Updated 6 years ago