aws-samples / tracking-aws-kms-key-policies-using-amazon-quicksight
☆11Updated 4 months ago
Alternatives and similar repositories for tracking-aws-kms-key-policies-using-amazon-quicksight:
Users that are interested in tracking-aws-kms-key-policies-using-amazon-quicksight are comparing it to the libraries listed below
- ☆4Updated 6 months ago
- ☆11Updated 7 months ago
- ☆11Updated 3 months ago
- Account Factory for Terraform (AFT) Blueprins☆22Updated last month
- Solution to specify elastic and dynamic cloud resources as objects that can be easily referenced within AWS Network Firewall rules☆17Updated 2 months ago
- Provides real-time data ingestion from OSI PI Data Archive to a modern data architecture on AWS with integrations to OSI PI Asset Framewo…☆9Updated last year
- This example shows how you can create a Lambda function to retrieve inventory information to create the integrated inventory spreadsheet …☆25Updated 7 months ago
- ☆13Updated 10 months ago
- ☆27Updated 5 months ago
- ☆24Updated last year
- ☆20Updated 3 months ago
- AWS STS Network Query Tool uses cross account roles to collect networking related information for multiple accounts and outputs a CSV.☆25Updated last year
- ☆12Updated last month
- Automated Forensics Orchestrator for Amazon EC2 is a self-service AWS Solution implementation that enterprise customers can deploy to qui…☆59Updated 5 months ago
- ☆12Updated 10 months ago
- Solution and deployment for recurring Security Hub Summary email to provide recipients with a proactive communication summarizing the sec…☆42Updated 3 weeks ago
- ☆24Updated last month
- Threat Designer is a GenerativeAI application designed to automate and streamline the threat modeling process for secure system design.☆16Updated last month
- Tag based CloudWatch dashboard uses CDK and resource groups tagging API to automatically produce CloudFormation templates for CloudWatch …☆44Updated last week
- This solution is intended for enterprises that need a streamlined way of managing user access to their AWS accounts. Using this solution,…☆68Updated 3 weeks ago
- Detect AWS usage anomalies in near-real time using OpenSearch Anomaly Detection and CloudTrail for improved cost management and security☆30Updated 11 months ago
- Accelerate AWS IAM Identity Center (successor to AWS Single Sign-On (SSO)) implementation using AWS CDK. This CDK program allows you to c…☆30Updated 2 years ago
- Centralized Network Inspection on AWS configures the AWS resources needed to filter network traffic. This solution saves you time by auto…☆43Updated last month
- This Guidance demonstrates how to configure a proxy in a virtual private cloud (VPC) to connect external services to your Amazon VPC Latt…☆11Updated 6 months ago
- ☆29Updated last year
- centralized approach to store and analyze AWS Health events(PHD,SHD)☆41Updated 3 weeks ago
- ☆20Updated 2 months ago
- Account Assessment for AWS Organizations programmatically scans all AWS accounts in an AWS Organization for identity-based and resource-b…☆35Updated 2 months ago
- ☆12Updated 9 months ago
- This sample illustrates using data compression with AWS Lambda functions☆11Updated 2 weeks ago