instacart / gadjitLinks
☆28Updated 6 months ago
Alternatives and similar repositories for gadjit
Users that are interested in gadjit are comparing it to the libraries listed below
Sorting:
- Open Cloud Security Posture Management Engine☆342Updated 3 years ago
- Documenting your Threat Models with HCL☆440Updated last month
- A simple threat modeling tool to help humans to reduce time-to-value when threat modeling☆649Updated this week
- A consolidated series of structured data for cloud identity and access management systems, including datasets for AWS, Azure, and Google …☆297Updated this week
- Automate permissions to your cloud and critical applications.☆242Updated last year
- Example policies demonstrating how to implement a data perimeter on AWS.☆189Updated this week
- List of vendors that do not allow IMDSv2 enforcement☆143Updated last year
- List of known AWS accounts☆249Updated this week
- Kickstart and manage your AWS Organization via Terraform☆113Updated last month
- ☆227Updated 3 months ago
- ☆380Updated last year
- AWS Organizations Service Control Policies (SCPs) written in HashiCorp Terraform.☆244Updated last year
- Safer AWS SCP deployments via real-time monitoring☆56Updated 2 years ago
- ☆375Updated last year
- Access Undenied parses AWS AccessDenied CloudTrail events, explains the reasons for them, and offers actionable remediation steps. Open-s…☆264Updated 2 years ago
- A python module to allow for easy integration with the Lacework APIs.☆18Updated last year
- ☆123Updated 6 months ago
- Shostack's 4 Question Frame for Threat Modeling☆152Updated last week
- AWS CloudSaga - Simulate security events in AWS☆471Updated this week
- Terraform provider for Prisma Cloud Compute☆25Updated 6 months ago
- boostsecurityio/poutine☆347Updated 3 weeks ago
- Publicly-listed AWS account IDs for easy lookup. Great for cleaning up false positives from unknown Account IDs in Cloudtrail☆38Updated last year
- A command line tool that validates AWS IAM Policies in a Terraform template against AWS IAM best practices☆343Updated 6 months ago
- Resource types that can be publicly exposed on AWS☆329Updated 3 years ago
- Lambda function that streamlines containment of an AWS account compromise☆345Updated 2 years ago
- Built-in Panther detection rules and policies☆430Updated this week
- OWASP Domain Protect - prevent subdomain takeover☆398Updated 11 months ago
- Cloud Commotion intends to cause chaos to simulate security incidents☆146Updated last year
- A repository of breaches of AWS customers☆793Updated last month
- SCP management tool☆134Updated 2 years ago