aws-samples / service-control-policy-examples
Example AWS Service control policies to get started or mature your usage of AWS SCPs.
☆229Updated this week
Alternatives and similar repositories for service-control-policy-examples:
Users that are interested in service-control-policy-examples are comparing it to the libraries listed below
- Example policies demonstrating how to implement a data perimeter on AWS.☆140Updated last month
- ☆133Updated this week
- SCP management tool☆129Updated last year
- AWS Security Analytics Bootstrap enables customers to perform security investigations on AWS service logs by providing an Amazon Athena a…☆243Updated this week
- Assisted Log Enabler for AWS - Find AWS resources that are not logging, and turn them on.☆245Updated this week
- ☆143Updated last month
- Automated Security Response on AWS is an add-on solution that works with AWS Security Hub to provide a ready-to-deploy architecture and a…☆407Updated last week
- ☆84Updated last year
- AWS Organizations Service Control Policies (SCPs) written in HashiCorp Terraform.☆234Updated 3 months ago
- Crowdsourced list of sensitive IAM Actions☆140Updated 2 months ago
- Enhance the security of your web applications effortlessly with AWS Firewall Factory. Safeguard your valuable assets through seamless WAF…☆238Updated this week
- ☆134Updated last week
- This repository can be used to generate and evaluate findings detected by Amazon GuardDuty☆356Updated last month
- AWS IAM Permissions Guardrails https://aws-samples.github.io/aws-iam-permissions-guardrails/☆123Updated last year
- This solutions facilitates rapid deployment of Prowler, full AWS Organization analysis, and finding processing as part of a security post…☆54Updated last month
- ☆113Updated last week
- Rules Registry for Compliance Frameworks☆112Updated 9 months ago
- A collection of documented and undocumented AWS API models☆31Updated 2 months ago
- This repository contains a sample IAM permissions boundary as a starting point for creating your own permissions boundary to meet the s…☆73Updated 5 months ago
- AWS Config resource schema define the properties and types of AWS Config resource configuration items (CIs). Resource CI schema are used …☆240Updated 7 months ago
- This solution supports a bidirectional integration between Security Hub and JIRA. Issues can be either created automatically or manually …☆37Updated 5 months ago
- ☆154Updated last week
- Access Undenied parses AWS AccessDenied CloudTrail events, explains the reasons for them, and offers actionable remediation steps. Open-s…☆261Updated last year
- AWS CloudSaga - Simulate security events in AWS☆446Updated this week
- Automated Amazon GuardDuty Security Response☆25Updated 3 weeks ago
- ☆29Updated last year
- An AWS tool to help you create a point in time assessment of your AWS account using Prowler.☆526Updated 2 months ago
- Open-source temporary elevated access solution for AWS IAM Identity Center.☆331Updated this week
- ☆32Updated 7 months ago
- Automatically compile an AWS Service Control Policy that ONLY allows AWS services that are compliant with your preferred compliance frame…☆225Updated last year