leboncoin / aws-towerLinks
AWS Tower give the ability to discover and monitor AWS account to find vulnerabilities or misconfigurations. Give also a brief overview for non-AWS expert. Not related at all of the AWS Trusted Advisor.
☆40Updated 6 months ago
Alternatives and similar repositories for aws-tower
Users that are interested in aws-tower are comparing it to the libraries listed below
Sorting:
- ☆285Updated 2 years ago
- Resource types that can be publicly exposed on AWS☆327Updated 3 years ago
- AWS Organizations Service Control Policies (SCPs) written in HashiCorp Terraform.☆243Updated 9 months ago
- Open Cloud Security Posture Management Engine☆342Updated 3 years ago
- ☆118Updated 2 months ago
- Assisted Log Enabler for AWS - Find AWS resources that are not logging, and turn them on.☆262Updated this week
- InSpec profile to validate your VPC to the standards of the CIS Amazon Web Services Foundations Benchmark☆78Updated 7 months ago
- ☆373Updated last year
- AWS Identity and Access Management Visualizer and Anomaly Finder☆296Updated last year
- AWS Inventory and Compliance Framework☆224Updated 2 years ago
- A cloud security tool to search and clean up unused AWS access keys, written in Go.☆50Updated 2 years ago
- Example AWS Resource control policies to get started or mature your usage of AWS RCPs.☆188Updated 4 months ago
- automate the control, the purge and the management of AWS accounts assigned permanently to selected employees - foster innovation from cl…☆45Updated 10 months ago
- Enhance the security of your web applications effortlessly with AWS Firewall Factory. Safeguard your valuable assets through seamless WAF…☆254Updated last week
- Uses the AWS Cloud Control API to list resources that are present in a given AWS account and region(s). Discovered resources are written …☆176Updated 3 months ago
- This repository can be used to generate and evaluate findings detected by Amazon GuardDuty☆403Updated last month
- AWS Security Analytics Bootstrap enables customers to perform security investigations on AWS service logs by providing an Amazon Athena a…☆252Updated this week
- Example detection of compromise credentials in AWS☆122Updated 7 years ago
- AWS CloudSaga - Simulate security events in AWS☆465Updated this week
- ☆137Updated this week
- A small lambda script that will disable access keys older than a given amount of days.☆154Updated 2 years ago
- Example policies demonstrating how to implement a data perimeter on AWS.☆174Updated last month
- Runs IAM policy linting and security checks against either a single AWS account or multiple member accounts of an AWS Organization.☆146Updated this week
- SCP management tool☆131Updated last year
- Lambda function that streamlines containment of an AWS account compromise☆346Updated last year
- Identify all permitted data paths originating from the Internet to Network Interfaces within AWS Accounts across the entire AWS Organizat…☆39Updated last year
- Multi-threaded AWS inventory collection tool with a focus on security-relevant resources and metadata.☆549Updated last month
- Analyzes CloudTrail data of a given AWS account and generates a summary of recently active IAM principals, API calls they made, as well a…☆163Updated 4 months ago
- List of vendors that do not allow IMDSv2 enforcement☆143Updated last year
- Identity & Access Management simplified and secure.☆258Updated 2 years ago