iKnowJavaScript / terraform-aws-vulne-soldierLinks
This Terraform module consists of the configuration for automating the remediation of AWS EC2 vulnerabilities using AWS Inspector findings. It provisions essential resources such as an SSM document, Lambda function, and CloudWatch event rules for automated vulnerability management.
☆49Updated 6 months ago
Alternatives and similar repositories for terraform-aws-vulne-soldier
Users that are interested in terraform-aws-vulne-soldier are comparing it to the libraries listed below
Sorting:
- KYE: Know Your Enemies - Check external access on your AWS account☆129Updated 9 months ago
- AWS honey token manager☆89Updated last year
- Collect IAM information from all your AWS organization, accounts, and resources.☆84Updated last week
- An IAM Simulator that outputs detailed explains of how a request was evaluated.☆97Updated last week
- Google Maps for AWS IAM☆262Updated this week
- ☆124Updated 8 months ago
- Safer AWS SCP deployments via real-time monitoring☆56Updated 2 years ago
- ☆31Updated 10 months ago
- Crowdsourced list of sensitive IAM Actions☆159Updated last year
- Analyzes CloudTrail data of a given AWS account and generates a summary of recently active IAM principals, API calls they made, as well a…☆165Updated last month
- Generates runbooks for GuardDuty findings☆38Updated last year
- AWS SSO Reporter☆55Updated 8 months ago
- A Terraform module that makes it a snap to opt out of all AWS AI/ML data harvesting.☆30Updated 2 years ago
- Runs IAM policy linting and security checks against either a single AWS account or multiple member accounts of an AWS Organization.☆151Updated last month
- Terraform templates for CI/CD to Cloud federation and Cloud2Cloud IAM federations☆67Updated 3 weeks ago
- Scalable integrity framework for ABAC on AWS☆56Updated 10 months ago
- Expand IAM Actions with Wildcards☆34Updated this week
- A multi-vault secret injection tool for safely injecting secrets into app environment☆132Updated last month
- ☆29Updated last month
- TrailAlerts is a AWS-native, serverless cloud-detection tool that lets you define simple rules as code and get rich alerts about events i…☆51Updated 2 months ago
- To clean up your AWS AMIs: First, include AMIs by name or tag. Second, exclude AMIs in use, younger than N days, or the newest N images. …☆36Updated this week
- Finders Keypers: AWS KMS Encryption Key Usage and Blast Radius Finder☆45Updated 5 months ago
- ☆46Updated last year
- A cloud security tool to search and clean up unused AWS access keys, written in Go.☆52Updated 3 years ago
- This terraform provider can be used to get remote code execution by injecting a dummy resource in a writeable state file.☆60Updated last year
- SCP management tool☆135Updated 2 years ago
- ☆42Updated 6 months ago
- The Amazon Elastic Kubernetes Service (EKS) Creation Engine (ECE) is a Python command-line program created by the Lightspin Office of the…☆42Updated 3 years ago
- Test & Compare different Kubernetes security offerings on EKS, GKE and AKS☆40Updated last year
- This is a project to quickly accelerate the adoption of CloudFormation Guard syntax for use in AWS Config rules. The advantage of CloudF…☆11Updated last year