dubrowin / AWS-Reasonable-Account-Defaults
CloudFormation template to create reasonable account defaults around Cost Surprise Alerting
☆169Updated 3 months ago
Alternatives and similar repositories for AWS-Reasonable-Account-Defaults:
Users that are interested in AWS-Reasonable-Account-Defaults are comparing it to the libraries listed below
- Collection of example Service Control Policies (SCPs) that are useful for sandbox and training AWS accounts.☆147Updated 3 months ago
- Repository for iamfast questions and issues☆171Updated this week
- ☆86Updated last year
- Create a break glass role for emergency use in order to limit AWS production account access. Configure automatic alerts and logging of ac…☆177Updated last year
- A command-line tool which can move CloudFormation resources between stacks☆99Updated this week
- rdsconn makes connecting to an AWS RDS instance inside a VPC from your laptop easier☆108Updated last year
- Bare minimum AWS Security Alerting and Configuration☆487Updated last month
- Allow users to request temporary elevated access to your AWS environment☆122Updated last year
- An ongoing accounting of what AWS's service gaps are in their IPv6 coverage, specifically those that have economic impact.☆90Updated last year
- bash functions to help run aws-cli commands across roles in multiple accounts with MFA☆68Updated 5 years ago
- Access Undenied parses AWS AccessDenied CloudTrail events, explains the reasons for them, and offers actionable remediation steps. Open-s…☆262Updated 2 years ago
- Get notified when actions are taken in the AWS Console.☆312Updated 2 months ago
- Help manage AWS systems manager with helpers☆386Updated 2 years ago
- Example AWS Service control policies to get started or mature your usage of AWS SCPs.☆237Updated 2 weeks ago
- Assume AWS IAM roles from GitHub Actions workflows with no stored secrets☆171Updated 3 years ago
- A tool to show what AWS account and identity you're using.☆93Updated 2 years ago
- Runs IAM policy linting and security checks against either a single AWS account or a set of member accounts of an AWS Organization.☆141Updated last week
- A project to collate IAM actions, AWS APIs and managed policies from various public sources.☆292Updated this week
- Builds a tree view of parameters from AWS System Manager Parameter Store☆69Updated last year
- Get AWS credentials from a profile to inject into other programs☆148Updated last year
- Rules Registry for Compliance Frameworks☆118Updated 11 months ago
- Are you a Thrifty AWS dev? This mod checks your AWS accounts for unused and under-utilized resources using Powerpipe and Steampipe.☆102Updated 4 months ago
- Example policies demonstrating how to implement a data perimeter on AWS.☆151Updated last week
- Framework for inspecting and editing traffic in AWS VPCs☆113Updated 3 years ago
- ☆137Updated 6 months ago
- Crowdsourced list of sensitive IAM Actions☆142Updated 4 months ago
- Quickly query the AWS IP Ranges☆82Updated this week
- Terraform module for serverless certificate authority on AWS☆123Updated this week
- AWS VPC Subnets Watcher☆76Updated last year
- A simple decorator to run Python functions across multiple AWS accounts, OUs and/or regions, with or without an AWS Organization.☆97Updated last year