miztiik / serverless-iam-key-sentryLinks
Find and list Access Keys older than certain date
☆13Updated 7 years ago
Alternatives and similar repositories for serverless-iam-key-sentry
Users that are interested in serverless-iam-key-sentry are comparing it to the libraries listed below
Sorting:
- Manage AWS Config Rules at scale in AWS multi-account and/or multi-region environment; with fully configurable deployment (RuleSets) and …☆274Updated 5 years ago
- Open source demos, concept and guidance related to the AWS CIS Foundation framework.☆619Updated 5 years ago
- Repsitory for notes and other independentlly done projects☆43Updated 6 years ago
- Collection of scripts and resources for DevSecOps and Automated Incident Response Security☆633Updated 4 years ago
- Learning Activities for the AWS Security Specialty Course☆82Updated 6 years ago
- This repository can be used to generate and evaluate findings detected by Amazon GuardDuty☆416Updated 3 weeks ago
- The AWS Config Rules Development Kit helps developers set up, author and test custom Config rules. It contains scripts to enable AWS Conf…☆476Updated 3 weeks ago
- Metrics and alarms for AWS security hub for the CIS standard☆94Updated 2 years ago
- This script automates the process of running the Security Hub multi-account workflow across a group of accounts that are in your control☆280Updated last year
- ☆33Updated last year
- The sample functions provided help to automate AWS Trusted Advisor best practices using Amazon Cloudwatch events and AWS Lambda.☆279Updated 2 months ago
- Cloud Custodian policy that logs unused security groups☆143Updated 4 years ago
- CloudTracker helps you find over-privileged IAM users and roles by comparing CloudTrail logs with current IAM policies.☆902Updated 4 years ago
- Code examples for the AWS Security Blog post: How to use CI/CD to deploy and configure AWS security services with Terraform☆97Updated 4 years ago
- A lambda function to push GuardDuty Findings to SNS Topic 🎓☆18Updated 4 years ago
- Cloud Custodian example policies that remediate security issues, enforce tagging, and control costs☆62Updated 3 years ago
- Cloud Conformity Auto Remediate☆157Updated 2 months ago
- ☆138Updated 5 years ago
- Automation and remediation bots for Dome9's (Continuous) Compliance Engine☆114Updated 5 months ago
- Open source application to instantly remediate common security issues through the use of AWS Config☆219Updated 5 years ago
- Lambda job in Python to automatically patch EC2 instances when an inspector assessment generates a CVE finding☆60Updated 7 years ago
- Creates a Transit Gateway with two server VPCs and a security VPC☆36Updated 4 years ago
- Automated Security Response on AWS is an add-on solution that works with AWS Security Hub to provide a ready-to-deploy architecture and a…☆454Updated last week
- Automatically tag AWS resources on creation, for cost assignment☆464Updated last year
- AWS Security Odyssey: A hands-on journey with security services and controls in the AWS cloud.☆45Updated 6 years ago
- Advanced AWS Security Automation Resources: Used by Udemy Course 🎓☆45Updated 3 years ago
- Solution and deployment for recurring Security Hub Summary email to provide recipients with a proactive communication summarizing the sec…☆44Updated 2 months ago
- CloudFormation templates that implement commonly-requested continuous monitoring solutions within the constraints of AWS GovCloud (US)☆23Updated 5 years ago
- Official documentation source for the AWS Identity and Access Management (IAM) User Guide☆323Updated 2 years ago
- Discover resources created in an AWS account.☆729Updated last year