dubrowin / AWS-Reasonable-Account-DefaultsLinks
CloudFormation template to create reasonable account defaults around Cost Surprise Alerting
☆173Updated last year
Alternatives and similar repositories for AWS-Reasonable-Account-Defaults
Users that are interested in AWS-Reasonable-Account-Defaults are comparing it to the libraries listed below
Sorting:
- Repository for iamfast questions and issues☆175Updated 9 months ago
- Collection of example Service Control Policies (SCPs) that are useful for sandbox and training AWS accounts.☆159Updated last week
- Create a break glass role for emergency use in order to limit AWS production account access. Configure automatic alerts and logging of ac…☆180Updated 2 years ago
- Access Undenied parses AWS AccessDenied CloudTrail events, explains the reasons for them, and offers actionable remediation steps. Open-s…☆264Updated 2 years ago
- An ongoing accounting of what AWS's service gaps are in their IPv6 coverage, specifically those that have economic impact.☆97Updated 2 years ago
- rdsconn makes connecting to an AWS RDS instance inside a VPC from your laptop easier☆108Updated 2 years ago
- ☆93Updated 3 weeks ago
- Stop EC2 instances and RDS/Aurora databases overnight by tagging them with cron schedules, to cut AWS costs. Trigger CloudFormation stack…☆74Updated 2 months ago
- Bare minimum AWS Security Alerting and Secure by default Configuration☆510Updated 7 months ago
- Allow users to request temporary elevated access to your AWS environment☆130Updated 2 years ago
- Builds a tree view of parameters from AWS System Manager Parameter Store☆69Updated last year
- Monitor AWS Managed IAM Policies Changes☆492Updated last week
- A project to collate IAM actions, AWS APIs and managed policies from various public sources.☆299Updated 3 weeks ago
- Help manage AWS systems manager with helpers☆389Updated 3 years ago
- Get notified when actions are taken in the AWS Console.☆325Updated 11 months ago
- A tool to show what AWS account and identity you're using.☆93Updated 2 years ago
- A command-line tool which can move CloudFormation resources between stacks☆101Updated last week
- Kickstart and manage your AWS Organization via Terraform☆114Updated this week
- Assume AWS IAM roles from GitHub Actions workflows with no stored secrets☆170Updated 4 years ago
- Example policies demonstrating how to implement a data perimeter on AWS.☆189Updated last week
- A consolidated series of structured data for cloud identity and access management systems, including datasets for AWS, Azure, and Google …☆297Updated this week
- Scripts to quickly fix security and compliance issues☆106Updated 2 years ago
- A crowdsourced AWS IAM permissions reference.☆102Updated 4 months ago
- Terraform module for serverless certificate authority on AWS☆156Updated last week
- Runs IAM policy linting and security checks against either a single AWS account or multiple member accounts of an AWS Organization.☆151Updated last week
- A command line tool that validates AWS IAM Policies in a Terraform template against AWS IAM best practices☆341Updated 6 months ago
- A simple decorator to run Python functions across multiple AWS accounts, OUs and/or regions, with or without an AWS Organization.☆98Updated last year
- Making botocore.exceptions.ClientError easier to deal with☆153Updated 2 years ago
- Are you a Thrifty AWS dev? This mod checks your AWS accounts for unused and under-utilized resources using Powerpipe and Steampipe.☆102Updated 3 weeks ago
- Get AWS credentials from a profile to inject into other programs☆150Updated 2 years ago