lacework / go-sdkLinks
A set of tools and libraries written in Go to interact with the Lacework platform.
☆38Updated this week
Alternatives and similar repositories for go-sdk
Users that are interested in go-sdk are comparing it to the libraries listed below
Sorting:
- List of vendors that do not allow IMDSv2 enforcement☆143Updated last year
- Cloud multi-account metadata management tool.☆91Updated 4 years ago
- AWS Inventory and Compliance Framework☆225Updated 2 years ago
- A serverless, event-driven AWS configuration collection service with configuration versioning.☆94Updated 4 years ago
- Example detection of compromise credentials in AWS☆122Updated 7 years ago
- ☆83Updated 5 years ago
- InSpec profile to validate your VPC to the standards of the CIS Amazon Web Services Foundations Benchmark☆77Updated 2 months ago
- Identity & Access Management simplified and secure.☆260Updated 2 years ago
- Parse and Process AWS IAM Policies, Statements, ARNs, and wildcards.☆444Updated last year
- Automatically compile an AWS Service Control Policy that ONLY allows AWS services that are compliant with your preferred compliance frame…☆225Updated 2 years ago
- AWS Organizations Service Control Policies (SCPs) written in HashiCorp Terraform.☆243Updated last year
- Automate the AWS GuardDuty account invitation lifecycle for all of your organizations AWS accounts in all regions as well as aggregate an…☆67Updated 2 years ago
- Dow Jones Hammer : Protect the cloud with the power of the cloud(AWS)☆443Updated 2 years ago
- ☆156Updated 2 years ago
- Github action for linting AWS IAM policy documents☆38Updated 2 years ago
- Code examples for the AWS Security Blog post: How to use CI/CD to deploy and configure AWS security services with Terraform☆97Updated 4 years ago
- Blazing CloudTrail since 2018☆138Updated 6 years ago
- Static analysis for CloudFormation templates to identify common misconfiguration☆56Updated 3 years ago
- A collection of useful queries that can be used to verify compliance/security across your AWS assets☆29Updated 6 years ago
- AWS managed IAM policies☆128Updated 3 years ago
- Marking instances dirty since 2018☆47Updated 6 years ago
- 'Continuous' AWS perimeter monitoring: Periodically scan internet facing AWS resources to detect misconfigured services.☆64Updated 6 years ago
- AWS Identity and Access Management Visualizer and Anomaly Finder☆297Updated last year
- No need for IAM users when we have Yubikeys☆159Updated 3 years ago
- Gathers AWS inventory and outputs CSV in the format for FedRAMP SSP☆36Updated 6 years ago
- GCP Auto Remediation Suite for High Risk Events☆43Updated 4 years ago
- Resource types that can be publicly exposed on AWS☆328Updated 3 years ago
- Splunk AWS Serverless applications and Lambda blueprints☆59Updated 11 months ago
- Pre-configured response & remediation playbooks for AWS Security Hub☆65Updated 3 years ago
- The open source version of the AWS Security Hub documentation. To provide feedback or request changes, you can submit a pull request that…☆35Updated 2 years ago