miztiik / serverless-iam-key-sentryLinks
Find and list Access Keys older than certain date
☆13Updated 7 years ago
Alternatives and similar repositories for serverless-iam-key-sentry
Users that are interested in serverless-iam-key-sentry are comparing it to the libraries listed below
Sorting:
- Learning Activities for the AWS Security Specialty Course☆82Updated 6 years ago
- Manage AWS Config Rules at scale in AWS multi-account and/or multi-region environment; with fully configurable deployment (RuleSets) and …☆276Updated 5 years ago
- Cloud Custodian policy that logs unused security groups☆141Updated 3 years ago
- The AWS Config Rules Development Kit helps developers set up, author and test custom Config rules. It contains scripts to enable AWS Conf…☆474Updated last week
- Open source demos, concept and guidance related to the AWS CIS Foundation framework.☆620Updated 5 years ago
- Automation and remediation bots for Dome9's (Continuous) Compliance Engine☆115Updated last month
- Resource Discovery for Azure☆41Updated 3 weeks ago
- This script automates the process of running the Security Hub multi-account workflow across a group of accounts that are in your control☆279Updated last year
- Collection of scripts and resources for DevSecOps and Automated Incident Response Security☆626Updated 4 years ago
- This repository can be used to generate and evaluate findings detected by Amazon GuardDuty☆406Updated 2 months ago
- The sample functions provided help to automate AWS Trusted Advisor best practices using Amazon Cloudwatch events and AWS Lambda.☆280Updated 10 months ago
- CloudTracker helps you find over-privileged IAM users and roles by comparing CloudTrail logs with current IAM policies.☆901Updated 3 years ago
- CloudFormation templates that implement commonly-requested continuous monitoring solutions within the constraints of AWS GovCloud (US)☆23Updated 5 years ago
- Cloud Conformity Auto Remediate☆157Updated last week
- A set of handy tools to make it easier for Operations teams to run to Trend Micro Deep Security.☆42Updated 3 years ago
- Automatically tag AWS resources on creation, for cost assignment☆465Updated last year
- Discover resources created in an AWS account.☆722Updated last year
- Repsitory for notes and other independentlly done projects☆44Updated 6 years ago
- Code examples for the AWS Security Blog post: How to use CI/CD to deploy and configure AWS security services with Terraform☆97Updated 4 years ago
- [Node, Python, Java] Repository of sample Custom Rules for AWS Config.☆1,714Updated 3 weeks ago
- A lambda function to push GuardDuty Findings to SNS Topic 🎓☆18Updated 4 years ago
- Open source application to instantly remediate common security issues through the use of AWS Config☆220Updated 5 years ago
- This is a collection of AWS CloudFormation templates which create Lambda functions triggered by CloudWatch Events rule to evaluate AWS AP…☆53Updated 6 years ago
- AWS Organizations Service Control Policies (SCPs) written in HashiCorp Terraform.☆243Updated 10 months ago
- The AWS Secure Environment Accelerator is a tool designed to help deploy and operate secure multi-account, multi-region AWS environments …☆764Updated last week
- This solution automatically deploys a single web access control list (web ACL) with a set of AWS WAF rules designed to filter common web-…☆896Updated last month
- AWS Inventory and Compliance Framework☆225Updated 2 years ago
- Cloud Custodian example policies that remediate security issues, enforce tagging, and control costs☆61Updated 2 years ago
- Automated Security Response on AWS is an add-on solution that works with AWS Security Hub to provide a ready-to-deploy architecture and a…☆444Updated 3 weeks ago
- Pre-configured response & remediation playbooks for AWS Security Hub☆65Updated 3 years ago