benkehoe / aws-whoami
A tool to show what AWS account and identity you're using.
☆93Updated last year
Related projects ⓘ
Alternatives and complementary repositories for aws-whoami
- AWS IAM policy generation from application code☆170Updated 10 months ago
- Serverless app designed for any customer with two or more accounts to view resources across accounts/regions in simple single pane of gla…☆111Updated last year
- bash functions to help run aws-cli commands across roles in multiple accounts with MFA☆68Updated 4 years ago
- AWS Baseline to roll out into your Organization☆134Updated 3 years ago
- Retrospectively tag AWS resources so you can work out who created them☆110Updated 11 months ago
- A simple decorator to run Python functions across multiple AWS accounts, OUs and/or regions, with or without an AWS Organization.☆97Updated 10 months ago
- IAM policy actions autocomplete, documentation & wildcard resolution for VS Code☆152Updated this week
- Builds a tree view of parameters from AWS System Manager Parameter Store☆69Updated 9 months ago
- Convert secrets stored in AWS Secrets Manager to environment variables☆47Updated last year
- Assume AWS IAM roles from GitHub Actions workflows with no stored secrets☆174Updated 3 years ago
- This script automates the process of running the GuardDuty multi-account workflow across a group of accounts that are in your control☆130Updated 2 months ago
- Python library to enable you to run custom AWS Config Rules at scale, using Lambda Layer.☆94Updated 4 months ago
- AWS bulk tagging tool☆153Updated last week
- Undocumented AWS Management Console APIs SDK for Python☆51Updated last year
- Collection of semi-useful Service Control Policies and scripts to manage them☆83Updated 4 months ago
- Self-service creation and deletion of sandbox-style accounts.☆344Updated last year
- AWS managed IAM policies☆127Updated 2 years ago
- A simple library to generate IAM policy statements with no need to remember all the actions APIs☆150Updated last year
- Run interactive shell commands on AWS Lambda☆148Updated 2 years ago
- AWS IAM Permissions Guardrails https://aws-samples.github.io/aws-iam-permissions-guardrails/☆122Updated last year
- Create new AWS accounts and Organizations on the fly and cleanup and close accounts afterwarts again. Fully automated.☆33Updated last year
- ☆79Updated 3 years ago
- Making botocore.exceptions.ClientError easier to deal with☆150Updated last year
- CloudFormation Custom Types for Terraform resources.☆57Updated 8 months ago
- Scripts to quickly fix security and compliance issues☆104Updated 11 months ago
- Generate Multi-Account IAM users/groups/roles/policies from a simple YAML configuration file and Jinja2 templates.☆240Updated 3 years ago
- A CLI tool for building simple to complex IAM policies☆70Updated 11 months ago
- Repo formerly known as mu-cdk. A.K.A Mu2. Pronounced: mew-tah-toe☆23Updated last year
- A command-line tool which can move CloudFormation resources between stacks☆88Updated this week
- Download AWS bills from the console programmatically.☆59Updated last year