iKnowJavaScript / terraform-aws-vulne-soldierLinks
This Terraform module consists of the configuration for automating the remediation of AWS EC2 vulnerabilities using AWS Inspector findings. It provisions essential resources such as an SSM document, Lambda function, and CloudWatch event rules for automated vulnerability management.
☆46Updated 4 months ago
Alternatives and similar repositories for terraform-aws-vulne-soldier
Users that are interested in terraform-aws-vulne-soldier are comparing it to the libraries listed below
Sorting:
- AWS honey token manager☆87Updated 10 months ago
- Collect IAM information from all your AWS organization, accounts, and resources.☆28Updated this week
- Safer AWS SCP deployments via real-time monitoring☆53Updated last year
- KYE: Know Your Enemies - Check external access on your AWS account☆119Updated last month
- TrailAlerts is a AWS-native, serverless cloud-detection tool that lets you define simple rules as code and get rich alerts about events i…☆44Updated last month
- Finders Keypers: AWS KMS Encryption Key Usage and Blast Radius Finder☆38Updated last month
- A Terraform module that makes it a snap to opt out of all AWS AI/ML data harvesting.☆30Updated last year
- ☆29Updated 7 months ago
- This terraform provider can be used to get remote code execution by injecting a dummy resource in a writeable state file.☆55Updated 4 months ago
- Generates runbooks for GuardDuty findings☆36Updated 11 months ago
- An IAM Simulator that outputs detailed explains of how a request was evaluated.☆80Updated last week
- ☆41Updated last year
- Scripts to quickly fix security and compliance issues☆27Updated last year
- ☆31Updated 2 months ago
- ☆45Updated 7 months ago
- Vulnerable by Design AWS Cloud Development Kit (CDK) Infrastructure☆47Updated last year
- https://breaches.cloud☆40Updated 8 months ago
- TODO: Funny pun about visibility☆163Updated this week
- AWS SSO Reporter☆54Updated last month
- The Amazon Elastic Kubernetes Service (EKS) Creation Engine (ECE) is a Python command-line program created by the Lightspin Office of the…☆40Updated 2 years ago
- To clean up your AWS AMIs: First, include AMIs by name or tag. Second, exclude AMIs in use, younger than N days, or the newest N images. …☆34Updated this week
- A cloud security tool to search and clean up unused AWS access keys, written in Go.☆49Updated 2 years ago
- Test & Compare different Kubernetes security offerings on EKS, GKE and AKS☆40Updated 9 months ago
- Compares and analyzes GCP IAM roles.☆77Updated 3 months ago
- Tools that checks for misconfigured access to Github OIDC from AWS roles and GCP service accounts☆61Updated 2 years ago
- ☆25Updated 2 months ago
- ☆48Updated 7 months ago
- CloudSplaining on AWS Managed Policies☆43Updated this week
- HashiCorp-relevant rules for the Semgrep code analysis tool☆41Updated last year
- ☆117Updated 3 weeks ago