aws-samples / secure-pipelines-in-aws-workshopLinks
Hands-on workshop on how to build security automation in pipelines
☆37Updated last year
Alternatives and similar repositories for secure-pipelines-in-aws-workshop
Users that are interested in secure-pipelines-in-aws-workshop are comparing it to the libraries listed below
Sorting:
- Workshop on how to implement automated remediations of findings submitted to AWS Security Hub leveraging an open source tool named Cloud …☆22Updated 4 years ago
- A Workshop for AWS Security Hub Integration, Prioritization, and Response☆72Updated last year
- Pre-configured response & remediation playbooks for AWS Security Hub☆65Updated 3 years ago
- Sample code for integrating AWS CloudFormation templates security tests (using CFN-Nag and CFN-Guard) with both AWS Security Hub and AWS …☆24Updated last year
- ☆34Updated 3 years ago
- A Lambda function for Resource Tagging Automation☆50Updated 10 months ago
- A collection of useful queries that can be used to verify compliance/security across your AWS assets☆30Updated 6 years ago
- AWS IAM Permissions Guardrails https://aws-samples.github.io/aws-iam-permissions-guardrails/☆125Updated 2 years ago
- ☆57Updated last year
- This is a collection of AWS CloudFormation templates which create Lambda functions triggered by CloudWatch Events rule to evaluate AWS AP…☆52Updated 6 years ago
- In this workshop we will build a pipeline for a sample WordPress site in a stack. We will explore how to validate, lint and test template…☆17Updated last year
- Workshop and sample code that builders can use for experiential learning of AWS services that provide data protection. Services such as A…☆91Updated last year
- ☆39Updated 3 years ago
- ☆20Updated 2 years ago
- AWS Modernization DevSecOps Code Samples☆13Updated 4 years ago
- AWS managed IAM policies☆128Updated 3 years ago
- This package provides an easy way to create a refreshable boto3 Session with AWS Roles Anywhere.☆58Updated 2 months ago
- Sample CloudFormation templates and architecture for AWS Control Tower☆29Updated last year
- Best practices for hardening your AWS account, most of them are free☆36Updated last year
- This implementation demonstrates the AWS Identity and Access Management (IAM) Access Analyzer policy validation capability. Learn how to …☆24Updated 3 years ago
- Code examples for the AWS Security Blog post: How to use CI/CD to deploy and configure AWS security services with Terraform☆97Updated 4 years ago
- Guard Duty Threat Feed: Automatically keeps FIRE_EYE feeds updated☆16Updated 6 years ago
- ☆26Updated 4 years ago
- Identify all permitted data paths originating from the Internet to Network Interfaces within AWS Accounts across the entire AWS Organizat…☆39Updated last year
- Assisted Log Enabler for AWS - Find AWS resources that are not logging, and turn them on.☆256Updated this week
- This solutions facilitates rapid deployment of Prowler, full AWS Organization analysis, and finding processing as part of a security post…☆59Updated last month
- Collection of semi-useful Service Control Policies and scripts to manage them☆99Updated 5 months ago
- ☆92Updated 8 months ago
- ☆41Updated last year
- CDK app to setup an isolated AWS network to experiment with ways of exfiltrating data☆18Updated 3 years ago