nemo-wq / AWS-IAM-Permissions-Scanner
AWS IAM User Permissions
☆20Updated 5 years ago
Alternatives and similar repositories for AWS-IAM-Permissions-Scanner
Users that are interested in AWS-IAM-Permissions-Scanner are comparing it to the libraries listed below
Sorting:
- Lambda job in Python to automatically deploy Inspector agent to newly-launched EC2 instances☆28Updated 6 years ago
- This CloudWatch Events rule Lambda function evaluates AWS API calls that change Amazon EC2 security group ingress rules. The function fla…☆25Updated 5 years ago
- [WORK IN PROGRESS] A repo containing rule sets for cloud-custodian inside GSA AWS accounts. This repo does not contain cloud-custodian it…☆30Updated 7 years ago
- Python scripts to run in AWS Lambda to process findings from Amazon Inspector☆39Updated 6 years ago
- Workshop exercise materials for re:Invent 2017 - SID 341: Using AWS CloudTrail Logs for Scalable, Automated Anomaly Detection☆52Updated 6 years ago
- Public tables and other research that can accept PRs. Please visit the web link.☆44Updated 5 years ago
- This command line tool counts the number of resources in different categories across Amazon regions.☆59Updated 5 years ago
- Lambda job in Python to automatically patch EC2 instances when an inspector assessment generates a CVE finding☆58Updated 6 years ago
- Cloud multi-account metadata management tool.☆91Updated 4 years ago
- Creates a CloudFormation stack for running Security Monkey☆27Updated 6 years ago
- Blazing CloudTrail since 2018☆137Updated 6 years ago
- Demonstrates sending AWS findings to your Slack Channel☆58Updated last year
- Cloudformation Template and Lambda to detect if Instance Profile credentials are being used outside your AWS Account.☆29Updated 5 years ago
- AKTION sends the latest AWS Services and Actions each week to your chosen email address. Essential for AWS IAM policy management.☆20Updated 5 years ago
- This is a collection of AWS CloudFormation templates which create Lambda functions triggered by CloudWatch Events rule to evaluate AWS AP…☆52Updated 6 years ago
- AWS Security Odyssey: A hands-on journey with security services and controls in the AWS cloud.☆45Updated 6 years ago
- The open source version of the Amazon GuardDuty documentation. You can provide feedback & requests for changes by submitting issues in th…☆22Updated last year
- Cloud Custodian Policies for Automated Amazon Resource Management☆59Updated 5 years ago
- An AWS config rule that uses IAM Access Advisor to find over-permissioned IAM users, groups, and roles.☆17Updated 5 years ago
- AWS Metadata Proxy for protection against SSRF☆68Updated 5 years ago
- Glue workflow to convert CloudTrail logs to Athena-friendly Parquet format☆48Updated last year
- A collection of useful queries that can be used to verify compliance/security across your AWS assets☆31Updated 5 years ago
- Some of my personal rules for CapitalOne's Cloud Custodian project☆45Updated 4 years ago
- Enhance the security of the EC2 metadata service. (Obsolete thanks to Instance Metadata Service Version 2, see note in README)☆31Updated 5 years ago
- Transform AWS Config snapshots to a more AWS Athena-friendly format.☆11Updated 4 years ago
- A project to create AWS Config Rules and use them to test AWS Resource compliance.☆21Updated 5 years ago
- Example container image re-scan with Amazon ECR☆50Updated 3 years ago
- ☆22Updated 5 years ago
- Github action for linting AWS IAM policy documents☆38Updated 2 years ago
- A serverless application for processing AWS GuardDuty findings.☆11Updated 6 years ago