cloud-copilot / iam-lensLinks
Google Maps for AWS IAM
☆259Updated this week
Alternatives and similar repositories for iam-lens
Users that are interested in iam-lens are comparing it to the libraries listed below
Sorting:
- KYE: Know Your Enemies - Check external access on your AWS account☆129Updated 8 months ago
- Analyzes CloudTrail data of a given AWS account and generates a summary of recently active IAM principals, API calls they made, as well a…☆166Updated last week
- Crowdsourced list of sensitive IAM Actions☆158Updated last year
- ☆124Updated 7 months ago
- AWS honey token manager☆89Updated last year
- An AWS IAM policy statement parser and query tool.☆196Updated 6 months ago
- Cloud Commotion intends to cause chaos to simulate security incidents☆146Updated last year
- AWS Attack Path Management Tool - Walking on the Moon☆259Updated last year
- Runs IAM policy linting and security checks against either a single AWS account or multiple member accounts of an AWS Organization.☆151Updated last week
- A collection of documented and undocumented AWS API models☆52Updated last month
- Generates runbooks for GuardDuty findings☆39Updated last year
- This Terraform module consists of the configuration for automating the remediation of AWS EC2 vulnerabilities using AWS Inspector finding…☆50Updated 5 months ago
- Safer AWS SCP deployments via real-time monitoring☆56Updated 2 years ago
- AWS SSO Reporter☆55Updated 7 months ago
- An IAM Simulator that outputs detailed explains of how a request was evaluated.☆95Updated this week
- Collect IAM information from all your AWS organization, accounts, and resources.☆83Updated last week
- List of known AWS accounts☆249Updated 2 weeks ago
- A tool to uncover undocumented APIs from the AWS Console.☆115Updated 8 months ago
- TrailAlerts is a AWS-native, serverless cloud-detection tool that lets you define simple rules as code and get rich alerts about events i…☆51Updated last month
- Uses the AWS Cloud Control API to list resources that are present in a given AWS account and region(s). Discovered resources are written …☆180Updated last week
- Example AWS Resource control policies to get started or mature your usage of AWS RCPs.☆194Updated this week
- Threat Designer is a GenerativeAI application designed to automate and streamline the threat modeling process for secure system design.☆175Updated 3 weeks ago
- Lambda function that streamlines containment of an AWS account compromise☆345Updated 2 years ago
- Finders Keypers: AWS KMS Encryption Key Usage and Blast Radius Finder☆46Updated 4 months ago
- Generate datasets of cloud audit logs for common attacks☆229Updated last year
- A cloud security tool to search and clean up unused AWS access keys, written in Go.☆51Updated 3 years ago
- An evolving repository of CloudTrail events with detailed descriptions, MITRE ATT&CK insights, real-world incidents, references and secur…☆173Updated last month
- A Terraform module that makes it a snap to opt out of all AWS AI/ML data harvesting.☆30Updated last year
- Open-source best practices for protecting a secure, sensible cloud platform☆128Updated last year
- SCP management tool☆134Updated 2 years ago