This Terraform module consists of the configuration for automating the remediation of AWS EC2 vulnerabilities using AWS Inspector findings. It provisions essential resources such as an SSM document, Lambda function, and CloudWatch event rules for automated vulnerability management.
☆50Jul 4, 2025Updated 7 months ago
Alternatives and similar repositories for terraform-aws-vulne-soldier
Users that are interested in terraform-aws-vulne-soldier are comparing it to the libraries listed below
Sorting:
- ☆46Nov 7, 2024Updated last year
- Official code for the paper entitled "Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense"☆15Apr 10, 2025Updated 10 months ago
- An IAM Simulator that outputs detailed explains of how a request was evaluated.☆98Updated this week
- A comprehensive checklist and guide for organizations looking to implement a robust cybersecurity program☆46Feb 2, 2026Updated 3 weeks ago
- Example AWS Resource control policies to get started or mature your usage of AWS RCPs.☆198Updated this week
- RansomWhen is a tool to enumerate identities that can lock S3 Buckets using KMS, resulting in ransomwares, as well as detect occurances o…☆61Feb 5, 2025Updated last year
- ☆18Feb 2, 2026Updated 3 weeks ago
- Scalable integrity framework for ABAC on AWS☆56Mar 14, 2025Updated 11 months ago
- KYE: Know Your Enemies - Check external access on your AWS account☆129Apr 25, 2025Updated 10 months ago
- Generates runbooks for GuardDuty findings☆38Jun 24, 2024Updated last year
- A Model Context Protocol server that connects AI assistants like Claude to AWS security services, allowing them to autonomously query, in…☆81Jul 25, 2025Updated 7 months ago
- Lightweight security tool for auditing your organization's Conditional Access Policies (CAPs) in Microsoft Entra ID for potential misconf…☆79Feb 25, 2025Updated last year
- Semgrep-based Policy Controller for Kubernetes☆47Apr 4, 2025Updated 10 months ago
- Threat Modeling with ATT&CK defines how to integreate MITRE ATT&CK® into your organization’s existing threat modeling methodology.☆12May 28, 2025Updated 9 months ago
- A CLI tool (and library) written in Go to simplify the process of retrieving IP addresses from infrastructure hosted on Google Cloud Plat…☆11Nov 20, 2025Updated 3 months ago
- Assess certain AWS network configurations☆12Aug 22, 2018Updated 7 years ago
- Safer AWS SCP deployments via real-time monitoring☆56Sep 30, 2023Updated 2 years ago
- Automate rule management for AWS Network Firewall☆17Updated this week
- Make AWS IAM policies smaller by adding wildcards to actions.☆19Updated this week
- Hijack a slack bot to phish your way in☆57Jul 17, 2025Updated 7 months ago
- ☆14Jan 8, 2026Updated last month
- This is a project to quickly accelerate the adoption of CloudFormation Guard syntax for use in AWS Config rules. The advantage of CloudF…☆12Dec 4, 2024Updated last year
- OCSF (https://schema.ocsf.io/) models in Python using Pydantic.☆34Feb 12, 2026Updated 2 weeks ago
- ☆31Oct 28, 2024Updated last year
- ☆32Apr 1, 2025Updated 10 months ago
- AWS SSO Reporter☆55May 7, 2025Updated 9 months ago
- A tool for secrets management, encryption as a service, and privileged access management☆13Jul 17, 2025Updated 7 months ago
- Host Internal Static Website on AWS☆17Dec 6, 2023Updated 2 years ago
- ☆32Updated this week
- AWS honey token manager☆89Aug 1, 2024Updated last year
- ☆36Apr 29, 2025Updated 10 months ago
- ☆30Jan 13, 2026Updated last month
- Scan your account for the use of untrusted AMIs☆31Feb 13, 2026Updated 2 weeks ago
- ☆18Sep 10, 2025Updated 5 months ago
- This solutions facilitates rapid deployment of Prowler, full AWS Organization analysis, and finding processing as part of a security post…☆61Jun 2, 2025Updated 8 months ago
- PolicyGlass allows you to analyse one or more AWS policies' effective permissions in aggregate, by restating them in the form of PolicySh…☆60Jan 9, 2022Updated 4 years ago
- ☆18Jul 30, 2024Updated last year
- ☆76Oct 18, 2025Updated 4 months ago
- Scan GitHub Actions Workflow logs for IOCs☆16Updated this week