leboncoin / aws-tower
AWS Tower give the ability to discover and monitor AWS account to find vulnerabilities or misconfigurations. Give also a brief overview for non-AWS expert. Not related at all of the AWS Trusted Advisor.
☆37Updated 10 months ago
Alternatives and similar repositories for aws-tower:
Users that are interested in aws-tower are comparing it to the libraries listed below
- automate the control, the purge and the management of AWS accounts assigned permanently to selected employees - foster innovation from cl…☆45Updated 4 months ago
- A cloud security tool to search and clean up unused AWS access keys, written in Go.☆49Updated 2 years ago
- ☆111Updated this week
- All-in-one auditing toolkit for identifying common security issues in managed Kubernetes environments. Currently supports Amazon EKS.☆325Updated last year
- The Amazon Elastic Kubernetes Service (EKS) Creation Engine (ECE) is a Python command-line program created by the Lightspin Office of the…☆40Updated 2 years ago
- ☆124Updated last month
- ☆113Updated last week
- Prevent SSRF attacks on AWS EC2 via automated upgrades to the more secure Instance Metadata Service v2 (IMDSv2).☆141Updated 9 months ago
- Identity & Access Management simplified and secure.☆251Updated last year
- AWS SSO Reporter☆54Updated last year
- SCP management tool☆129Updated last year
- Compares and analyzes GCP IAM roles.☆77Updated 7 months ago
- AWS Organizations Service Control Policies (SCPs) written in HashiCorp Terraform.☆234Updated 3 months ago
- ☆368Updated 10 months ago
- ☆133Updated last week
- An AWS IAM policy statement parser and query tool.☆168Updated 11 months ago
- Resource types that can be publicly exposed on AWS☆320Updated 2 years ago
- ☆134Updated last week
- Example policies demonstrating how to implement a data perimeter on AWS.☆140Updated last month
- A simple tool to audit your AWS/GCP infrastructure for misconfiguration or potential security issues with plugins integration☆318Updated last week
- Assisted Log Enabler for AWS - Find AWS resources that are not logging, and turn them on.☆245Updated this week
- AWS Certified Security Specialty (2020) course notes☆115Updated 4 years ago
- Identify all permitted data paths originating from the Internet to Network Interfaces within AWS Accounts across the entire AWS Organizat…☆36Updated last year
- IAM-Deescalate helps mitigate privilege escalation risk in AWS identity and access management (IAM)☆96Updated 2 years ago
- A Cloud Security Posture Manager or CSPM with a focus on security analysis for the modern cloud stack and a focus on the emerging threat …☆178Updated 4 months ago
- Generate a firewall-like report for AWS Security Groups☆13Updated last year
- Crowdsourced list of sensitive IAM Actions☆140Updated 2 months ago
- Automate permissions to your cloud and critical applications.☆238Updated 10 months ago
- ☆281Updated 2 years ago
- Validate all your Customer IAM Policies against AWS Access Analyzer - Policy Validation☆43Updated 3 years ago