iKnowJavaScript / terraform-aws-vulne-soldier
This Terraform module consists of the configuration for automating the remediation of AWS EC2 vulnerabilities using AWS Inspector findings. It provisions essential resources such as an SSM document, Lambda function, and CloudWatch event rules for automated vulnerability management.
☆46Updated 2 months ago
Alternatives and similar repositories for terraform-aws-vulne-soldier:
Users that are interested in terraform-aws-vulne-soldier are comparing it to the libraries listed below
- ☆39Updated 5 months ago
- AWS honey token manager☆87Updated 8 months ago
- Safer AWS SCP deployments via real-time monitoring☆51Updated last year
- Tools that checks for misconfigured access to Github OIDC from AWS roles and GCP service accounts☆61Updated last year
- Generates runbooks for GuardDuty findings☆35Updated 9 months ago
- This terraform provider can be used to get remote code execution by injecting a dummy resource in a writeable state file.☆53Updated 2 months ago
- A Terraform module that makes it a snap to opt out of all AWS AI/ML data harvesting.☆30Updated last year
- ☆29Updated 5 months ago
- Vulnerable by Design AWS Cloud Development Kit (CDK) Infrastructure☆47Updated last year
- Test & Compare different Kubernetes security offerings on EKS, GKE and AKS☆39Updated 7 months ago
- An IAM Simulator that outputs detailed explains of how a request was evaluated.☆74Updated this week
- ☆30Updated 2 weeks ago
- https://breaches.cloud☆39Updated 6 months ago
- To clean up your AWS AMIs: First, include AMIs by name or tag. Second, exclude AMIs in use, younger than N days, or the newest N images. …☆33Updated this week
- ☆116Updated 3 weeks ago
- AWS SSO Reporter☆54Updated last year
- Terraform templates for CI/CD to Cloud federation and Cloud2Cloud IAM federations☆63Updated 5 months ago
- HashiCorp-relevant rules for the Semgrep code analysis tool☆40Updated last year
- ☆41Updated last year
- Finders Keypers: AWS KMS Encryption Key Usage and Blast Radius Finder☆33Updated 4 months ago
- ☆29Updated 5 months ago
- Crowdsourced list of sensitive IAM Actions☆144Updated 5 months ago
- CloudSplaining on AWS Managed Policies☆41Updated this week
- Compares and analyzes GCP IAM roles.☆77Updated last month
- ☆48Updated 5 months ago
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆139Updated 3 months ago
- Public repository of all things cloud security.☆41Updated 6 months ago
- ☆44Updated 3 months ago
- ☆22Updated 2 years ago
- Runs IAM policy linting and security checks against either a single AWS account or a set of member accounts of an AWS Organization.☆142Updated last month