aws-solutions / security-insights-on-awsLinks
☆9Updated 3 months ago
Alternatives and similar repositories for security-insights-on-aws
Users that are interested in security-insights-on-aws are comparing it to the libraries listed below
Sorting:
- ☆19Updated last year
- Automated Forensics Orchestrator for Amazon EC2 is a self-service AWS Solution implementation that enterprise customers can deploy to qui…☆64Updated this week
- Detect AWS usage anomalies in near-real time using OpenSearch Anomaly Detection and CloudTrail for improved cost management and security☆31Updated last year
- ☆55Updated 2 weeks ago
- Automated AWS account hardening with AWS Control Tower and AWS Step Functions☆37Updated 4 months ago
- ☆15Updated 7 months ago
- Many AWS Accounts, one email address.☆20Updated 2 weeks ago
- AWS STS Network Query Tool uses cross account roles to collect networking related information for multiple accounts and outputs a CSV.☆25Updated last year
- ☆39Updated 3 years ago
- ☆10Updated last month
- ☆12Updated 5 months ago
- The Sensitive Data Protection on AWS solution allows enterprise customers to create data catalogs, discover, protect, and visualize sensi…☆119Updated 5 months ago
- This package provides an easy way to create a refreshable boto3 Session with AWS Roles Anywhere.☆58Updated 2 months ago
- Account Assessment for AWS Organizations programmatically scans all AWS accounts in an AWS Organization for identity-based and resource-b…☆40Updated last month
- This project provides a solution to AWS customers for reporting on what tags exists, the resources they are applied to, and what resource…☆22Updated last year
- This solutions facilitates rapid deployment of Prowler, full AWS Organization analysis, and finding processing as part of a security post…☆59Updated last month
- SCP management tool☆132Updated last year
- Solution and deployment for recurring Security Hub Summary email to provide recipients with a proactive communication summarizing the sec…☆43Updated 3 months ago
- Automated AWS Organizations configuration for security operations☆36Updated 4 months ago
- Example AWS Service control policies to get started or mature your usage of AWS SCPs.☆247Updated this week
- Example policies demonstrating how to implement a data perimeter on AWS.☆172Updated this week
- This pattern describes how to use AWS Control Tower Controls, AWS Cloud Development Kit (CDK) and infrastructure as code to implement and…☆41Updated 3 weeks ago
- This solution is intended for enterprises that need a streamlined way of managing user access to their AWS accounts. Using this solution,…☆69Updated 3 months ago
- ☆32Updated last year
- ☆4Updated last month
- Runs IAM policy linting and security checks against either a single AWS account or a set of member accounts of an AWS Organization.☆145Updated 2 weeks ago
- ☆17Updated last year
- Collect IAM information from all your AWS organization, accounts, and resources.☆36Updated this week
- ☆89Updated last month
- Solution to setup a recurring Security Hub CSV full report with email notification to provide detailed report of the security posture.☆21Updated 3 months ago