mitre / cis-aws-foundations-hardeningLinks
(WIP) A terraform / kitchen-terraform hardening baseline for the cis-aws-foundations-baseline
☆24Updated 3 years ago
Alternatives and similar repositories for cis-aws-foundations-hardening
Users that are interested in cis-aws-foundations-hardening are comparing it to the libraries listed below
Sorting:
- Some of my personal rules for CapitalOne's Cloud Custodian project☆45Updated 4 years ago
- [WORK IN PROGRESS] A repo containing rule sets for cloud-custodian inside GSA AWS accounts. This repo does not contain cloud-custodian it…☆30Updated 7 years ago
- InSpec profile to validate your VPC to the standards of the CIS Amazon Web Services Foundations Benchmark☆78Updated 5 months ago
- A curated list of things relating to CapitalOne's Cloud-custodian project☆90Updated 5 years ago
- Code examples for the AWS Security Blog post: How to use CI/CD to deploy and configure AWS security services with Terraform☆96Updated 3 years ago
- Dump your EC2 Security Groups as a CSV or JSON file☆71Updated 2 years ago
- Lambda job in Python to automatically patch EC2 instances when an inspector assessment generates a CVE finding☆59Updated 6 years ago
- Cloud Custodian Policies for Automated Amazon Resource Management☆59Updated 5 years ago
- Terraform module to provision Service Control Policies (SCP) for AWS Organizations, Organizational Units, and AWS accounts☆51Updated this week
- This CloudWatch Events rule Lambda function evaluates AWS API calls that change Amazon EC2 security group ingress rules. The function fla…☆25Updated 5 years ago
- Manheim's Cloud Custodian (c7n) wrapper package, policy generator, runner, and supporting tools.☆45Updated 3 months ago
- Github action for linting AWS IAM policy documents☆38Updated 2 years ago
- A continuous security pipeline demo for the AWS DevSecOps Workshop.☆45Updated 5 years ago
- An AWS config rule that uses IAM Access Advisor to find over-permissioned IAM users, groups, and roles.☆17Updated 5 years ago
- A serverless application for processing AWS GuardDuty findings.☆11Updated 6 years ago
- Public tables and other research that can accept PRs. Please visit the web link.☆44Updated 5 years ago
- The golden AMI pipeline enables creation, distribution, verification, launch-compliance, and decommissioning of the golden AMI out of the…☆11Updated 5 years ago
- Validate all your Customer IAM Policies against AWS Access Analyzer - Policy Validation☆43Updated 4 years ago
- SSH-Restricted deploys an SSH compliance rule (AWS Config) with auto-remediation via AWS Lambda if SSH access is public.☆30Updated 4 years ago
- Cloudformation Template and Lambda to detect if Instance Profile credentials are being used outside your AWS Account.☆29Updated 5 years ago
- A collection of useful queries that can be used to verify compliance/security across your AWS assets☆31Updated 5 years ago
- Cloud Custodian Policy Files and code☆68Updated 2 years ago
- Python scripts to run in AWS Lambda to process findings from Amazon Inspector☆39Updated 6 years ago
- Show the history and changes between configuration versions of AWS resources☆70Updated 6 years ago
- This Terraform module helps to setup an AWS account with the requirements of CIS Amazon Web Services Foundations Benchmark v1.1.0☆16Updated 7 years ago
- Automate the daily partitioning of your CloudTrail bucket in Athena☆28Updated last year
- Workshop exercise materials for re:Invent 2017 - SID 341: Using AWS CloudTrail Logs for Scalable, Automated Anomaly Detection☆52Updated 6 years ago
- Terraform module for Policy Sentry.☆25Updated 4 years ago
- Pre-configured response & remediation playbooks for AWS Security Hub☆65Updated 3 years ago
- Tools to help automate your AWS Accounts☆100Updated 9 months ago