aws-samples / visualize-iam-access-analyzer-policy-validation-findingsLinks
☆20Updated 2 years ago
Alternatives and similar repositories for visualize-iam-access-analyzer-policy-validation-findings
Users that are interested in visualize-iam-access-analyzer-policy-validation-findings are comparing it to the libraries listed below
Sorting:
- SCP management tool☆133Updated last year
- ☆39Updated 3 years ago
- ☆32Updated last year
- A solution designed to simplify AWS Identity Center (SSO) management using simple JSON/YAML inputs.☆14Updated 3 weeks ago
- Sample CloudFormation templates and architecture for AWS Control Tower☆29Updated 2 years ago
- ☆34Updated 3 years ago
- Hands-on workshop on how to build security automation in pipelines☆37Updated last year
- A Solution for AWS Resource Tagging Automation☆51Updated last week
- A Workshop for AWS Security Hub Integration, Prioritization, and Response☆72Updated last year
- Sample code for integrating AWS CloudFormation templates security tests (using CFN-Nag and CFN-Guard) with both AWS Security Hub and AWS …☆24Updated last year
- This solution will help you automate user group assignment to permission sets in AWS IAM Identity center for accessing any or all AWS acc…☆25Updated 5 months ago
- This solutions facilitates rapid deployment of Prowler, full AWS Organization analysis, and finding processing as part of a security post…☆62Updated 2 months ago
- This repository contains a sample IAM permissions boundary as a starting point for creating your own permissions boundary to meet the s…☆83Updated 6 months ago
- Collection of samples for Management and Governance services☆68Updated 3 months ago
- Collection of semi-useful Service Control Policies and scripts to manage them☆99Updated 6 months ago
- This project provides a solution to AWS customers for reporting on what tags exists, the resources they are applied to, and what resource…☆22Updated last year
- AWS IAM Permissions Guardrails https://aws-samples.github.io/aws-iam-permissions-guardrails/☆124Updated 2 years ago
- ☆32Updated 2 years ago
- ☆12Updated last year
- ☆17Updated 5 months ago
- Many AWS Accounts, one email address.☆21Updated last month
- bash functions to help run aws-cli commands across roles in multiple accounts with MFA☆68Updated 5 years ago
- Crowdsourced list of sensitive IAM Actions☆153Updated 9 months ago
- This implementation demonstrates the AWS Identity and Access Management (IAM) Access Analyzer policy validation capability. Learn how to …☆24Updated 3 years ago
- Example policies demonstrating how to implement a data perimeter on AWS.☆176Updated last week
- Implements OPA-based preventive security controls for AWS Infrastructure using Terraform Infrastructure as Code (IaC), that can establish…☆42Updated last year
- The Amazon Web Services (AWS) Config Resource Compliance Dashboard (CRCD) shows the inventory of your AWS resources, along with their com…☆23Updated 2 weeks ago
- ☆13Updated 4 months ago
- ☆23Updated 2 years ago
- A cloud security tool to search and clean up unused AWS access keys, written in Go.☆51Updated 2 years ago