fugue / fugue-client
Command line client for the Fugue API
☆14Updated 2 years ago
Alternatives and similar repositories for fugue-client:
Users that are interested in fugue-client are comparing it to the libraries listed below
- ☆17Updated last month
- ☆41Updated last year
- ☆32Updated 9 months ago
- SSH-Restricted deploys an SSH compliance rule (AWS Config) with auto-remediation via AWS Lambda if SSH access is public.☆30Updated 4 years ago
- This package provides an easy way to create a refreshable boto3 Session with AWS Roles Anywhere.☆56Updated 5 months ago
- Python script to analyze and extract all Security Groups information☆43Updated 10 months ago
- Learning Terraform in 20 Hours☆28Updated 4 years ago
- The open source version of the AWS Security Hub documentation. To provide feedback or request changes, you can submit a pull request that…☆35Updated last year
- CDK app to setup an isolated AWS network to experiment with ways of exfiltrating data☆18Updated 3 years ago
- Coalfire AWS RAMP/pak Reference Architecture☆36Updated 7 months ago
- The Amazon Elastic Kubernetes Service (EKS) Creation Engine (ECE) is a Python command-line program created by the Lightspin Office of the…☆40Updated 2 years ago
- ☆21Updated last month
- AWS Security Cookbook, published by Packt☆43Updated 2 years ago
- ☆20Updated 2 years ago
- Visual Studio Code extension for writing Terrascan Rego policies☆21Updated 7 months ago
- ☆52Updated this week
- Work with the AWS IP address ranges in native Python.☆13Updated last year
- ☆41Updated last year
- ☆32Updated last month
- A collection of DoD and Federal Government Cloud Computing Resources☆48Updated 4 years ago
- ☆16Updated 8 months ago
- A collection of 2020 artifacts describing the major pain points, vulnerabilities and concerns with Cloud Security.☆19Updated 4 years ago
- A continuous security pipeline demo for the AWS DevSecOps Workshop.☆45Updated 5 years ago
- CloudCustodian Rules engine for cloud security and governance, DSL in yaml for policies to query, filter, and take actions on resources☆19Updated last year
- ☆21Updated 2 years ago
- Identify all permitted data paths originating from the Internet to Network Interfaces within AWS Accounts across the entire AWS Organizat…☆39Updated last year
- Hands-on workshop on how to build security automation in pipelines☆37Updated last year
- Sample CloudFormation templates and architecture for AWS Control Tower☆28Updated last year
- Generates runbooks for GuardDuty findings☆35Updated 10 months ago
- ☆22Updated 2 years ago