benkehoe / aws-whoami
A tool to show what AWS account and identity you're using.
☆93Updated 2 years ago
Alternatives and similar repositories for aws-whoami:
Users that are interested in aws-whoami are comparing it to the libraries listed below
- bash functions to help run aws-cli commands across roles in multiple accounts with MFA☆68Updated 5 years ago
- Assume AWS IAM roles from GitHub Actions workflows with no stored secrets☆171Updated 3 years ago
- Serverless app designed for any customer with two or more accounts to view resources across accounts/regions in simple single pane of gla…☆112Updated last year
- Repository for iamfast questions and issues☆175Updated 3 weeks ago
- Convert secrets stored in AWS Secrets Manager to environment variables☆47Updated 2 years ago
- Retrospectively tag AWS resources so you can work out who created them☆112Updated last year
- Python library to enable you to run custom AWS Config Rules at scale, using Lambda Layer.☆98Updated 4 months ago
- A simple decorator to run Python functions across multiple AWS accounts, OUs and/or regions, with or without an AWS Organization.☆97Updated last year
- IAM policy actions autocomplete, documentation & wildcard resolution for VS Code☆152Updated this week
- Builds a tree view of parameters from AWS System Manager Parameter Store☆69Updated last year
- Assumed role session chaining (with credential refreshing) for boto3☆159Updated 2 years ago
- AWS managed IAM policies☆128Updated 3 years ago
- Lambda Extension for iamlive☆42Updated 3 years ago
- CloudFormation Custom Types for Terraform resources.☆58Updated last year
- This script automates the process of running the GuardDuty multi-account workflow across a group of accounts that are in your control☆130Updated 7 months ago
- AWS Baseline to roll out into your Organization☆133Updated 4 years ago
- Audit IAM roles and users using Access Advisor data using Python/boto3 SDK and automatically create IAM permissions boundaries to limit a…☆37Updated 4 years ago
- A community driven repository where you can find AWS Resource Type Providers for different purposes (including org-formation ones).☆90Updated 9 months ago
- AWS IAM Permissions Guardrails https://aws-samples.github.io/aws-iam-permissions-guardrails/☆124Updated 2 years ago
- Making botocore.exceptions.ClientError easier to deal with☆152Updated last year
- Generates an IAM policy for the CloudFormation service role that adheres to least privilege.☆111Updated last year
- A python library exposing services that are not covered by the official boto3 library but are driven by undocumented APIs.☆61Updated 9 months ago
- AWS Landing Zone Template☆40Updated 4 years ago
- Repo formerly known as mu-cdk. A.K.A Mu2. Pronounced: mew-tah-toe☆23Updated 2 years ago
- A simple library to generate IAM policy statements with no need to remember all the actions APIs☆151Updated last year
- Collection of example Service Control Policies (SCPs) that are useful for sandbox and training AWS accounts.☆148Updated 4 months ago
- Unicorn-maker is a complete example of an AWS CloudFormation resource type. This resource is built in multiple languages.☆43Updated 2 years ago
- Generate Multi-Account IAM users/groups/roles/policies from a simple YAML configuration file and Jinja2 templates.☆245Updated 3 years ago
- A CLI tool for building simple to complex IAM policies☆70Updated last year
- CLI tool for injecting parameters stored in AWS SSM into executables.☆23Updated 4 years ago