iacsecurity / tool-compareLinks
☆285Updated 3 years ago
Alternatives and similar repositories for tool-compare
Users that are interested in tool-compare are comparing it to the libraries listed below
Sorting:
- AWS Organizations Service Control Policies (SCPs) written in HashiCorp Terraform.☆244Updated last year
- Automatically compile an AWS Service Control Policy that ONLY allows AWS services that are compliant with your preferred compliance frame…☆225Updated 2 years ago
- A command line tool that validates AWS IAM Policies in a Terraform template against AWS IAM best practices☆341Updated 6 months ago
- Uses the AWS Cloud Control API to list resources that are present in a given AWS account and region(s). Discovered resources are written …☆180Updated this week
- SCP management tool☆134Updated 2 years ago
- Terraform PrismaCloud provider☆55Updated 8 months ago
- Access Undenied parses AWS AccessDenied CloudTrail events, explains the reasons for them, and offers actionable remediation steps. Open-s…☆263Updated 2 years ago
- Get notified when actions are taken in the AWS Console.☆325Updated 11 months ago
- Collection of semi-useful Service Control Policies and scripts to manage them☆101Updated 10 months ago
- Identity & Access Management simplified and secure.☆260Updated 2 years ago
- Sample DevSecOps pipelines (heavily biased on the "Sec") for various stacks and tools using open-source security tools and AWS native ser…☆73Updated 4 years ago
- Automate permissions to your cloud and critical applications.☆242Updated last year
- Code examples for the AWS Security Blog post: How to use CI/CD to deploy and configure AWS security services with Terraform☆97Updated 4 years ago
- Monitor AWS Managed IAM Policies Changes☆492Updated last week
- AWS Inventory and Compliance Framework☆225Updated 2 years ago
- Example policies demonstrating how to implement a data perimeter on AWS.☆189Updated last week
- ☆124Updated 6 months ago
- Crowdsourced list of sensitive IAM Actions☆157Updated last year
- A library of rules for Conftest used to detect misconfigurations within Terraform configuration files☆191Updated 3 years ago
- List of vendors that do not allow IMDSv2 enforcement☆143Updated last year
- ☆177Updated 6 months ago
- Cloud Custodian policy that logs unused security groups☆142Updated 4 years ago
- Runs IAM policy linting and security checks against either a single AWS account or multiple member accounts of an AWS Organization.☆151Updated 4 months ago
- Assisted Log Enabler for AWS - Find AWS resources that are not logging, and turn them on.☆268Updated this week
- A cloud security tool to search and clean up unused AWS access keys, written in Go.☆51Updated 3 years ago
- Resource types that can be publicly exposed on AWS☆329Updated 3 years ago
- Scripts to quickly fix security and compliance issues☆106Updated 2 years ago
- Collection of example Service Control Policies (SCPs) that are useful for sandbox and training AWS accounts.☆158Updated this week
- Example AWS Service control policies to get started or mature your usage of AWS SCPs.☆270Updated last month
- Open Cloud Security Posture Management Engine☆342Updated 3 years ago