aws-solutions-library-samples / guidance-for-baseline-security-assessment-on-awsLinks
This Guidance helps customers assess their foundational security setup in their AWS account
☆21Updated last year
Alternatives and similar repositories for guidance-for-baseline-security-assessment-on-aws
Users that are interested in guidance-for-baseline-security-assessment-on-aws are comparing it to the libraries listed below
Sorting:
- Account Assessment for AWS Organizations programmatically scans all AWS accounts in an AWS Organization for identity-based and resource-b…☆41Updated 3 weeks ago
- ☆17Updated 8 months ago
- ☆22Updated last year
- ☆10Updated last year
- Many AWS Accounts, one email address.☆21Updated 3 months ago
- The AWS Innovation Sandbox solution provisions isolated, self-contained, environments to help developers, security professionals, and inf…☆32Updated last year
- Large enterprises try to find a balance between controlling risk and empowering their developers in alignment with DevOps practices. Id…☆20Updated 4 years ago
- ☆36Updated 2 years ago
- ☆16Updated last year
- Accelerate AWS IAM Identity Center (successor to AWS Single Sign-On (SSO)) implementation using AWS CDK. This CDK program allows you to c…☆35Updated 2 years ago
- ☆17Updated 8 months ago
- ☆18Updated last year
- ☆12Updated last year
- AWS CloudFormation templates and Python code for AWS blog post on how to automate centralized backup at scale across AWS services using A…☆36Updated last year
- This solution is intended for enterprises that need a streamlined way of managing user access to their AWS accounts. Using this solution,…☆72Updated 7 months ago
- Automated AWS Organizations configuration for security operations☆37Updated 8 months ago
- The AWS Operational Readiness Review (ORR) acts as a sanity & safety check for a new workload built on AWS services, assessed before the …☆24Updated 2 years ago
- aws-solutions-library-samples / guidance-for-cross-network-traffic-inspection-with-aws-network-firewallThis Guidance demonstrates how to automate the deployment of centralized network security infrastructure that inspects and filters traffi…☆44Updated 2 months ago
- Collection of samples for Management and Governance services☆69Updated 6 months ago
- Solution to specify elastic and dynamic cloud resources as objects that can be easily referenced within AWS Network Firewall rules☆17Updated 8 months ago
- ☆43Updated 3 weeks ago
- ☆57Updated last year
- ☆16Updated 9 months ago
- AWS GD2ACL☆57Updated last year
- This repository contains exercises that show how to use AWS Secrets Manager in different scenarios.☆41Updated 4 years ago
- ☆15Updated last year
- L3 construct that can be used to quickly deploy a complete EC2 Image Builder Image Pipeline☆44Updated this week
- ☆22Updated 2 years ago
- Tag based CloudWatch dashboard uses CDK and resource groups tagging API to automatically produce CloudFormation templates for CloudWatch …☆45Updated 5 months ago
- Using a configuration file alone, deploy complex AWS Network Architectures using the AWS CDK to learn from and explore!☆41Updated 6 months ago