lightspin-tech / eks-creation-engine
The Amazon Elastic Kubernetes Service (EKS) Creation Engine (ECE) is a Python command-line program created by the Lightspin Office of the CISO to facilitate the creation and enablement of secure EKS Clusters.
☆40Updated 2 years ago
Alternatives and similar repositories for eks-creation-engine:
Users that are interested in eks-creation-engine are comparing it to the libraries listed below
- SCP management tool☆131Updated last year
- ☆117Updated last month
- Generates runbooks for GuardDuty findings☆35Updated 10 months ago
- Crowdsourced list of sensitive IAM Actions☆144Updated 6 months ago
- AWS SSO Reporter☆54Updated last year
- Identify all permitted data paths originating from the Internet to Network Interfaces within AWS Accounts across the entire AWS Organizat…☆39Updated last year
- A cloud security tool to search and clean up unused AWS access keys, written in Go.☆49Updated 2 years ago
- Safer AWS SCP deployments via real-time monitoring☆51Updated last year
- ☆41Updated last year
- ☆39Updated 3 years ago
- AWS honey token manager☆87Updated 9 months ago
- PolicyGlass allows you to analyse one or more AWS policies' effective permissions in aggregate, by restating them in the form of PolicySh…☆59Updated 3 years ago
- Scripts to quickly fix security and compliance issues☆26Updated last year
- Compares and analyzes GCP IAM roles.☆77Updated last month
- This solutions facilitates rapid deployment of Prowler, full AWS Organization analysis, and finding processing as part of a security post…☆57Updated 5 months ago
- CloudSplaining on AWS Managed Policies☆43Updated this week
- Runs IAM policy linting and security checks against either a single AWS account or a set of member accounts of an AWS Organization.☆142Updated 2 months ago
- Awesome AWS service control policies (SCPs), Resource Control Policies (RCPs), and other organizational policies☆27Updated last week
- This solution supports a bidirectional integration between Security Hub and JIRA. Issues can be either created automatically or manually …☆38Updated 9 months ago
- Example policies demonstrating how to implement a data perimeter on AWS.☆155Updated 2 weeks ago
- ☆22Updated 2 years ago
- ☆21Updated 2 years ago
- Deliberately vulnerable AWS resources for security assessment demos☆31Updated 2 years ago
- Expand IAM Actions with Wildcards☆29Updated this week
- Terraform module to provision Service Control Policies (SCP) for AWS Organizations, Organizational Units, and AWS accounts☆51Updated 3 weeks ago
- Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Security Management.☆31Updated 6 months ago
- Rego policies for enterprise-scale Compliance-as-Code with OPA Conftest.☆58Updated last year
- https://breaches.cloud☆39Updated 6 months ago
- Convert cloudtrail data to MITRE ATT&CK Sightings☆80Updated 2 years ago
- InSpec profile to validate your VPC to the standards of the CIS Amazon Web Services Foundations Benchmark☆78Updated 4 months ago