orcasecurity / shiftleft-iac-action
Orca Security - IaC Security GitHub Action
☆13Updated 3 weeks ago
Related projects ⓘ
Alternatives and complementary repositories for shiftleft-iac-action
- Audit log wall of shame.☆41Updated 3 weeks ago
- A Golang program to rotate AWS & GCP account keys☆65Updated 2 months ago
- Compares and analyzes GCP IAM roles.☆76Updated 5 months ago
- Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Security Management.☆29Updated 3 weeks ago
- Simple plug-and-play Github Action to block unauthorized outbound traffic (egress) in your Github workflows☆79Updated this week
- Slack bot which promotes Defense in Depth/Zero Trust security practices☆24Updated last year
- Whole-infrastructure automation tooling for AWS☆41Updated 4 months ago
- Detect publicly accessible Lambda Function URLs in your AWS account☆9Updated 2 years ago
- GCP CSPM using Google Sheets☆34Updated 4 months ago
- Tools that checks for misconfigured access to Github OIDC from AWS roles and GCP service accounts☆57Updated last year
- ☆42Updated 2 weeks ago
- Convert cloudtrail data to MITRE ATT&CK Sightings☆79Updated 2 years ago
- Protect against subdomain takeover☆92Updated 5 months ago
- A place for the InfoSec community to share and celebrate real stories of organizations successfully using SBOMs (and other bills of mater…☆42Updated 11 months ago
- Generates runbooks for GuardDuty findings☆34Updated 4 months ago
- HashiCorp-relevant rules for the Semgrep code analysis tool☆37Updated last year
- Knowledge Report Alert & Normalization Generator☆27Updated 7 months ago
- Deliberately vulnerable AWS resources for security assessment demos☆31Updated 2 years ago
- ☆109Updated 3 weeks ago
- ☆66Updated 5 months ago
- Independently deploy customized honeyservices in AWS to trigger alerts on unauthorized access. It utilizes a dedicated CloudTrail for pre…☆43Updated 5 months ago
- Test & Compare different Kubernetes security offerings on EKS, GKE and AKS☆34Updated 2 months ago
- Harness the security superpowers of your cloud asset inventory☆10Updated last month
- AWS honey token manager☆84Updated 3 months ago
- Cloud Commotion intends to cause chaos to simulate security incidents☆136Updated 4 months ago
- Security Alert Decoration☆26Updated this week
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆40Updated last month
- IAMFinder enumerates and finds users and IAM roles in a target AWS account.☆109Updated 3 years ago
- ☆151Updated 2 months ago