awslabs / sensitive-data-protection-on-awsLinks
The Sensitive Data Protection on AWS solution allows enterprise customers to create data catalogs, discover, protect, and visualize sensitive data across multiple AWS accounts. The solution eliminates the need for manual tagging to track sensitive data such as Personal Identifiable Information (PII) and classified information.
☆118Updated 4 months ago
Alternatives and similar repositories for sensitive-data-protection-on-aws
Users that are interested in sensitive-data-protection-on-aws are comparing it to the libraries listed below
Sorting:
- Account Assessment for AWS Organizations programmatically scans all AWS accounts in an AWS Organization for identity-based and resource-b…☆40Updated last month
- ☆140Updated last month
- ☆53Updated this week
- ☆75Updated this week
- ☆89Updated last month
- Example policies demonstrating how to implement a data perimeter on AWS.☆167Updated last week
- This solution is intended for enterprises that need a streamlined way of managing user access to their AWS accounts. Using this solution,…☆69Updated 2 months ago
- The Amazon Web Services (AWS) Config Resource Compliance Dashboard (CRCD) shows the inventory of your AWS resources, along with their com…☆23Updated this week
- ☆15Updated 2 years ago
- DBTop Monitoring is lightweight application to perform realtime monitoring for AWS Database Resources. Based on same simplicity concept o…☆46Updated 4 months ago
- A library with Make targets, Ansible playbooks, Jinja templates (and more) designed to boost common software development tasks and enhanc…☆84Updated 2 weeks ago
- Implement backup and recovery with AWS Backup across your AWS Organizations using a CI/CD pipeline (AWS CodePipeline).☆36Updated 6 months ago
- Collection of samples for Management and Governance services☆68Updated last month
- Centralized Network Inspection on AWS configures the AWS resources needed to filter network traffic. This solution saves you time by auto…☆44Updated 2 weeks ago
- Accelerate AWS IAM Identity Center (successor to AWS Single Sign-On (SSO)) implementation using AWS CDK. This CDK program allows you to c…☆30Updated 2 years ago
- Solution and deployment for recurring Security Hub Summary email to provide recipients with a proactive communication summarizing the sec…☆43Updated 2 months ago
- This repository contains a sample IAM permissions boundary as a starting point for creating your own permissions boundary to meet the s…☆82Updated 4 months ago
- Repository contains reference and sample templates in support of establishing your AWS cloud foundation☆113Updated last month
- AWS IAM Permissions Guardrails https://aws-samples.github.io/aws-iam-permissions-guardrails/☆124Updated 2 years ago
- ☆34Updated 6 months ago
- ☆36Updated last year
- Using a configuration file alone, deploy complex AWS Network Architectures using the AWS CDK to learn from and explore!☆41Updated 2 months ago
- Automated AWS account hardening with AWS Control Tower and AWS Step Functions☆36Updated 3 months ago
- ☆20Updated 5 months ago
- Runs IAM policy linting and security checks against either a single AWS account or a set of member accounts of an AWS Organization.☆145Updated this week
- The Automated Data Analytics on AWS solution provides an end-to-end data platform for ingesting, transforming, managing and querying data…☆89Updated 9 months ago
- A Lambda function for Resource Tagging Automation☆51Updated 10 months ago
- Standardised pipeline accelerators for AWS CodePipeline and GitLab CI for Infrastructure provisioning tools like CloudFormation, CDK and …☆40Updated 2 months ago
- ☆57Updated last year
- Using Terraform to enable Amazon GuardDuty for accounts in AWS Organizations.☆62Updated 7 months ago