cjsrkd3321 / aws-security-architecturesLinks
aws-security-architecture
☆14Updated 2 years ago
Alternatives and similar repositories for aws-security-architectures
Users that are interested in aws-security-architectures are comparing it to the libraries listed below
Sorting:
- Runs checks to see if an EKS cluster follows EKS Best Practices.☆928Updated 4 months ago
- The easy button for learning, testing and demoing Amazon EKS☆243Updated 2 months ago
- Get notified when actions are taken in the AWS Console.☆323Updated 8 months ago
- Karpenter Blueprints is a list of common workload scenarios following best practices. You'll find here details of why configuring the Kar…☆303Updated last month
- Open-source temporary elevated access solution for AWS IAM Identity Center.☆436Updated 2 weeks ago
- A command line tool that validates AWS IAM Policies in a Terraform template against AWS IAM best practices☆343Updated 4 months ago
- CLI to convert Kubernetes specifications to ECS Fargate and vice-versa☆256Updated last year
- aws2tf - automates the importing of existing AWS resources into Terraform and outputs the Terraform HCL code.☆692Updated 2 weeks ago
- AWS Quick Start Team☆489Updated last week
- All-in-one auditing toolkit for identifying common security issues in managed Kubernetes environments. Currently supports Amazon EKS.☆366Updated 2 months ago
- Terraform module which provisions addons on Amazon EKS clusters☆364Updated 2 months ago
- Open source project to help accelerate and ease observability setup on AWS environments☆312Updated last week
- Slack bot to temporary assign AWS SSO Permission set to a user☆49Updated last month
- AHA is an incident management & communication framework to provide real-time alert customers when there are active AWS event(s). For cust…☆365Updated 10 months ago
- ☆145Updated last year
- ☆59Updated 2 years ago
- Enhance the security of your web applications effortlessly with AWS Firewall Factory. Safeguard your valuable assets through seamless WAF…☆257Updated this week
- Use SQL to instantly query AWS resources across regions and accounts. Open source CLI. No DB required.☆214Updated this week
- Example AWS Service control policies to get started or mature your usage of AWS SCPs.☆261Updated last week
- Pod Security Admission (PSA) Testing for Kubernetes 1.23+☆20Updated 2 years ago
- Deployment models for AWS Network Firewall with Terraform☆13Updated last year
- ☆160Updated this week
- Amazon EKS custom AMIs based on Amazon Linux☆189Updated 2 years ago
- The AWS provider for the Secrets Store CSI Driver allows you to fetch secrets from AWS Secrets Manager and AWS Systems Manager Parameter …☆558Updated this week
- ☆156Updated last week
- Terraform module to configure WAF V2 Web ACL with managed rules for Application Load Balancer☆147Updated last year
- Automate permissions to your cloud and critical applications.☆242Updated last year
- Automated Amazon EKS cluster upgrade☆159Updated 9 months ago
- ☆285Updated 2 years ago
- AWS Config resource schema define the properties and types of AWS Config resource configuration items (CIs). Resource CI schema are used …☆258Updated 7 months ago