kdeldycke / awesome-iam
π€ Identity and Access Management knowledge for cloud platforms
β1,896Updated last week
Alternatives and similar repositories for awesome-iam:
Users that are interested in awesome-iam are comparing it to the libraries listed below
- π Software and Libraries for Authentication & Authorization & SSO & IAMβ1,048Updated last month
- π° Billing & Payments knowledge for cloud platformsβ1,044Updated last week
- A curated collection of awesome resources for the zero-trust security model.β746Updated 2 years ago
- Curating the best DevSecOps resources and tooling.β1,473Updated 7 months ago
- Pomerium is an identity and context-aware access proxy.β4,191Updated this week
- π§° A zero trust swiss army knife for working with X509, OAuth, JWT, OATH OTP, etc.β3,801Updated this week
- Tfsec is now part of Trivyβ6,791Updated last month
- A cloud native Identity & Access Proxy / API (IAP) and Access Control Decision API that authenticates, authorizes, and mutates incoming Hβ¦β3,321Updated this week
- Curated list of resources on HashiCorp's Terraform and OpenTofuβ5,712Updated last week
- The most scalable and customizable permission server on the market. Fix your slow or broken permission system with Google's proven "Zanziβ¦β4,950Updated this week
- Open Source, Google Zanzibar-inspired database for scalably storing and querying fine-grained authorization dataβ5,479Updated this week
- Implementation of the Cedar Policy Languageβ968Updated this week
- Find security vulnerabilities, compliance issues, and infrastructure misconfigurations early in the development cycle of your infrastructβ¦β2,244Updated this week
- Principles to help you design and deploy a zero trust architectureβ1,670Updated last year
- A curated list of awesome Linux Containers frameworks, libraries and softwareβ1,871Updated 11 months ago
- A curated list for awesome GitOps resourcesβ1,566Updated 9 months ago
- Zero-ETL, infinite possibilities. Live query APIs, code & more with SQL. No DB required.β7,243Updated this week
- A curated list of information and resources about authorization.β418Updated 3 months ago
- OpenSSF Scorecard - Security health metrics for Open Sourceβ4,822Updated this week
- π How to transition from software development to engineering managementβ2,165Updated 4 months ago
- Write tests against structured configuration data using the Open Policy Agent Rego query languageβ2,933Updated this week
- Boundary enables identity-based access management for dynamic infrastructure.β3,904Updated this week
- The OWASP DevSecOps Guideline can help us to embedding security as a part of the development pipeline.β903Updated last month
- continuous integration and continuous deliveryβ1,916Updated 11 months ago
- Artificial Intelligence Infrastructure-as-Code Generator.β3,622Updated 4 months ago
- Regula checks infrastructure as code templates (Terraform, CloudFormation, k8s manifests) for AWS, Azure, Google Cloud, and Kubernetes seβ¦β963Updated 6 months ago
- Fix Inventory helps you identify and remove the most critical risks in AWS, GCP, Azure and Kubernetes.β1,783Updated last week
- Read your tfstate or HCL to generate a graph specific for each provider, showing only the resources that are most important/relevant.β1,820Updated 2 months ago
- π‘οΈ A private certificate authority (X.509 & SSH) & ACME server for secure automated certificate management, so you can use TLS everywherβ¦β7,112Updated this week
- A curated list of OPA related tools, frameworks and articlesβ803Updated 4 months ago