buzzfactoryFE / AwsGraphDBLinks
Load AWS infrastructure into Neo4j Database for security and compliance analisys
☆11Updated 3 years ago
Alternatives and similar repositories for AwsGraphDB
Users that are interested in AwsGraphDB are comparing it to the libraries listed below
Sorting:
- Graph AWS resources in Neptune☆88Updated 2 years ago
- Automated Forensics Orchestrator for Amazon EC2 and EKS is a self-service AWS Guidance implementation that enterprise customers can deplo…☆65Updated 2 weeks ago
- AWS IAM Permissions Guardrails https://aws-samples.github.io/aws-iam-permissions-guardrails/☆126Updated 2 years ago
- The Amazon Web Services (AWS) Config Resource Compliance Dashboard (CRCD) shows the inventory of your AWS resources, along with their com…☆25Updated this week
- A schema and set of tools for using SQL to query cloud infrastructure.☆65Updated 4 years ago
- This solution will help you automate user group assignment to permission sets in AWS IAM Identity center for accessing any or all AWS acc…☆25Updated 10 months ago
- This package provides an easy way to create a refreshable boto3 Session with AWS Roles Anywhere.☆58Updated 8 months ago
- Run individual configuration, compliance and security controls or full compliance benchmarks for CIS across all of your GCP projects usin…☆40Updated 4 months ago
- This repository contains a sample IAM permissions boundary as a starting point for creating your own permissions boundary to meet the s…☆90Updated 11 months ago
- Automate rule management for AWS Network Firewall☆17Updated 3 weeks ago
- ☆22Updated 3 years ago
- This project provides a solution to AWS customers for reporting on what tags exists, the resources they are applied to, and what resource…☆25Updated last year
- ☆36Updated last year
- This solution is intended for enterprises that need a streamlined way of managing user access to their AWS accounts. Using this solution,…☆72Updated 10 months ago
- Collection of samples for Management and Governance services☆69Updated 2 weeks ago
- Example policies demonstrating how to implement a data perimeter on AWS.☆190Updated last week
- A CLI tool for building simple to complex IAM policies☆69Updated 2 years ago
- ☆16Updated last year
- Automated AWS account hardening with AWS Control Tower and AWS Step Functions☆38Updated 11 months ago
- A Solution for AWS Resource Tagging Automation☆53Updated 2 months ago
- ☆22Updated 2 years ago
- Crowdsourced list of sensitive IAM Actions☆159Updated last year
- Generates an IAM policy for the CloudFormation service role that adheres to least privilege.☆111Updated 2 years ago
- ☆14Updated last year