glassechidna / trackiamLinks
A project to collate IAM actions, AWS APIs and managed policies from various public sources.
☆298Updated this week
Alternatives and similar repositories for trackiam
Users that are interested in trackiam are comparing it to the libraries listed below
Sorting:
- Self-service creation and deletion of sandbox-style accounts.☆346Updated 2 years ago
- Assume AWS IAM roles from GitHub Actions workflows with no stored secrets☆170Updated 4 years ago
- Access Undenied parses AWS AccessDenied CloudTrail events, explains the reasons for them, and offers actionable remediation steps. Open-s…☆264Updated 2 years ago
- Repository for iamfast questions and issues☆175Updated 7 months ago
- Automatically compile an AWS Service Control Policy that ONLY allows AWS services that are compliant with your preferred compliance frame…☆225Updated 2 years ago
- Create a break glass role for emergency use in order to limit AWS production account access. Configure automatic alerts and logging of ac…☆179Updated last year
- 📝 AWS Conferences One-Pagers [DEPRECATED]☆184Updated 2 years ago
- Open source application to instantly remediate common security issues through the use of AWS Config☆219Updated 5 years ago
- Allow users to request temporary elevated access to your AWS environment☆130Updated last year
- Monitor AWS Managed IAM Policies Changes☆491Updated last week
- Parse and Process AWS IAM Policies, Statements, ARNs, and wildcards.☆445Updated last year
- IAM policy actions autocomplete, documentation & wildcard resolution for VS Code☆154Updated 4 months ago
- Scripts to quickly fix security and compliance issues☆106Updated last year
- Help manage AWS systems manager with helpers☆388Updated 3 years ago
- A command-line tool to get valuable information out of AWS CloudTrail☆826Updated last week
- AWS Organizations Service Control Policies (SCPs) written in HashiCorp Terraform.☆243Updated last year
- bash functions to help run aws-cli commands across roles in multiple accounts with MFA☆69Updated 5 years ago
- Programmatically delete AWS resources based on an allowlist and time to live (TTL) settings☆495Updated 2 years ago
- AWS IAM Permissions Guardrails https://aws-samples.github.io/aws-iam-permissions-guardrails/☆125Updated 2 years ago
- AWS Baseline to roll out into your Organization☆134Updated 4 years ago
- A simple decorator to run Python functions across multiple AWS accounts, OUs and/or regions, with or without an AWS Organization.☆98Updated last year
- AWS Config resource schema define the properties and types of AWS Config resource configuration items (CIs). Resource CI schema are used …☆258Updated 7 months ago
- A crowdsourced AWS IAM permissions reference.☆99Updated 2 months ago
- ☆141Updated last month
- Generate Multi-Account IAM users/groups/roles/policies from a simple YAML configuration file and Jinja2 templates.☆246Updated 4 years ago
- Identity & Access Management simplified and secure.☆260Updated 2 years ago
- A tool to show what AWS account and identity you're using.☆93Updated 2 years ago
- This script automates the process of running the GuardDuty multi-account workflow across a group of accounts that are in your control☆131Updated last year
- CloudFormation template to create reasonable account defaults around Cost Surprise Alerting☆173Updated 10 months ago
- AWS managed IAM policies☆128Updated 3 years ago