cloudposse / terraform-aws-cloudtrail-cloudwatch-alarms
Terraform module for creating alarms for tracking important changes and occurrences from cloudtrail.
☆202Updated last month
Alternatives and similar repositories for terraform-aws-cloudtrail-cloudwatch-alarms:
Users that are interested in terraform-aws-cloudtrail-cloudwatch-alarms are comparing it to the libraries listed below
- Terraform Module for AWS Landing Zone☆177Updated 4 years ago
- Enables AWS Config and adds managed config rules with good defaults.☆230Updated last month
- A curated list of things relating to CapitalOne's Cloud-custodian project☆89Updated 4 years ago
- Cloud Custodian policy that logs unused security groups☆142Updated 3 years ago
- AWS Baseline to roll out into your Organization☆133Updated 3 years ago
- Cloud Custodian example policies that remediate security issues, enforce tagging, and control costs☆61Updated 2 years ago
- This script automates the process of running the GuardDuty multi-account workflow across a group of accounts that are in your control☆130Updated 5 months ago
- Tools to help automate your AWS Accounts☆99Updated 5 months ago
- AWS Organizations Service Control Policies (SCPs) written in HashiCorp Terraform.☆237Updated 4 months ago
- Demonstrates integrating Amazon GuardDuty with your Slack Channel☆133Updated 10 months ago
- [WIP] Get up and running quickly with one of our reference architecture using our fully automated cold-start process.☆154Updated 4 years ago
- Cloud Custodian Policy Files and code☆67Updated 2 years ago
- A small lambda script that will disable access keys older than a given amount of days.☆152Updated last year
- Generate Multi-Account IAM users/groups/roles/policies from a simple YAML configuration file and Jinja2 templates.☆244Updated 3 years ago
- AWS WAF at terraform modules to mitigate OWASP’s Top 10 Web Application Vulnerabilities☆92Updated 9 months ago
- Demonstrates sending AWS findings to your Slack Channel☆57Updated last year
- Terraform module to provision an AWS CloudTrail and an encrypted S3 bucket with versioning to store CloudTrail logs☆115Updated last month
- Retrospectively tag AWS resources so you can work out who created them☆112Updated last year
- Use AWS WAF at terraform to Mitigate OWASP’s Top 10 Web Application Vulnerabilities☆68Updated 5 years ago
- Automatically tag AWS resources on creation, for cost assignment☆464Updated 10 months ago
- Scripts to quickly fix security and compliance issues☆105Updated last year
- Manage AWS Config Rules at scale in AWS multi-account and/or multi-region environment; with fully configurable deployment (RuleSets) and …☆277Updated 4 years ago
- This ansible role gets information from an AWS VPC and generate a graphical representation of security groups☆103Updated 4 years ago
- ☆133Updated 2 years ago
- Goes around tagging things☆255Updated last year
- Some of my personal rules for CapitalOne's Cloud Custodian project☆43Updated 3 years ago
- This module creates an S3 bucket suitable for receiving logs from other AWS services such as S3, CloudFront, and CloudTrail☆118Updated 3 weeks ago
- Audit IAM roles and users using Access Advisor data using Python/boto3 SDK and automatically create IAM permissions boundaries to limit a…☆37Updated 4 years ago
- An example of an AMI Builder using CI/CD with AWS CodePipeline, AWS CodeBuild, Hashicorp Packer and Ansible.☆461Updated 5 years ago
- Terraform module that configures important RDS alerts using CloudWatch and sends them to an SNS topic☆125Updated last week