miztiik / serverless-iam-key-sentryLinks
Find and list Access Keys older than certain date
☆13Updated 7 years ago
Alternatives and similar repositories for serverless-iam-key-sentry
Users that are interested in serverless-iam-key-sentry are comparing it to the libraries listed below
Sorting:
- Manage AWS Config Rules at scale in AWS multi-account and/or multi-region environment; with fully configurable deployment (RuleSets) and …☆276Updated 5 years ago
- Cloud Custodian policy that logs unused security groups☆141Updated 3 years ago
- Learning Activities for the AWS Security Specialty Course☆82Updated 6 years ago
- This script automates the process of running the Security Hub multi-account workflow across a group of accounts that are in your control☆278Updated last year
- Open source demos, concept and guidance related to the AWS CIS Foundation framework.☆621Updated 5 years ago
- CloudFormation templates that implement commonly-requested continuous monitoring solutions within the constraints of AWS GovCloud (US)☆23Updated 5 years ago
- This repository can be used to generate and evaluate findings detected by Amazon GuardDuty☆399Updated last month
- This solution automatically deploys a single web access control list (web ACL) with a set of AWS WAF rules designed to filter common web-…☆891Updated 7 months ago
- Collection of scripts and resources for DevSecOps and Automated Incident Response Security☆626Updated 4 years ago
- The sample functions provided help to automate AWS Trusted Advisor best practices using Amazon Cloudwatch events and AWS Lambda.☆280Updated 8 months ago
- The AWS Config Rules Development Kit helps developers set up, author and test custom Config rules. It contains scripts to enable AWS Conf…☆471Updated this week
- Repsitory for notes and other independentlly done projects☆44Updated 5 years ago
- Discover resources created in an AWS account.☆719Updated last year
- Pre-configured response & remediation playbooks for AWS Security Hub☆65Updated 3 years ago
- Cloud Conformity Auto Remediate☆157Updated last month
- Golden AMI pipeline setup sample☆135Updated 3 years ago
- Automatically tag AWS resources on creation, for cost assignment☆465Updated last year
- CloudTracker helps you find over-privileged IAM users and roles by comparing CloudTrail logs with current IAM policies.☆900Updated 3 years ago
- AWS Config resource schema define the properties and types of AWS Config resource configuration items (CIs). Resource CI schema are used …☆255Updated 4 months ago
- This script automates the process of running the GuardDuty multi-account workflow across a group of accounts that are in your control☆131Updated 10 months ago
- Metrics and alarms for AWS security hub for the CIS standard☆94Updated 2 years ago
- The AWS Secure Environment Accelerator is a tool designed to help deploy and operate secure multi-account, multi-region AWS environments …☆762Updated 2 weeks ago
- Get started on building AWS Partner Solutions by using our examples.☆328Updated 7 months ago
- Cloud Custodian example policies that remediate security issues, enforce tagging, and control costs☆61Updated 2 years ago
- Creates a Transit Gateway with two server VPCs and a security VPC☆35Updated 3 years ago
- Scripts to quickly fix security and compliance issues☆106Updated last year
- Automated Security Response on AWS is an add-on solution that works with AWS Security Hub to provide a ready-to-deploy architecture and a…☆431Updated 5 months ago
- ☆137Updated 5 years ago
- Sample pipeline for handling of security events in AWS.☆131Updated 5 years ago
- ☆33Updated last year