ovotech / cloud-key-rotatorLinks
A Golang program to rotate AWS & GCP account keys
☆66Updated 2 months ago
Alternatives and similar repositories for cloud-key-rotator
Users that are interested in cloud-key-rotator are comparing it to the libraries listed below
Sorting:
- AWS SSO Reporter☆54Updated 2 months ago
- AWS honey token manager☆87Updated 11 months ago
- Compares and analyzes GCP IAM roles.☆77Updated 4 months ago
- Safer AWS SCP deployments via real-time monitoring☆53Updated last year
- PolicyGlass allows you to analyse one or more AWS policies' effective permissions in aggregate, by restating them in the form of PolicySh…☆60Updated 3 years ago
- Crowdsourced list of sensitive IAM Actions☆151Updated 8 months ago
- HashiCorp-relevant rules for the Semgrep code analysis tool☆41Updated last year
- prel(iminary) is an application that temporarily assigns Google Cloud IAM Roles and includes an approval process.☆45Updated this week
- A cloud security tool to search and clean up unused AWS access keys, written in Go.☆51Updated 2 years ago
- This Terraform module consists of the configuration for automating the remediation of AWS EC2 vulnerabilities using AWS Inspector finding…☆48Updated last week
- An IAM Simulator that outputs detailed explains of how a request was evaluated.☆88Updated this week
- Scripts to quickly fix security and compliance issues☆27Updated last year
- ☆117Updated last month
- Tools that checks for misconfigured access to Github OIDC from AWS roles and GCP service accounts☆61Updated 2 years ago
- Attaché provides an emulation layer for Cloud Provider IMDS APIs☆57Updated last year
- A Terraform module that makes it a snap to opt out of all AWS AI/ML data harvesting.☆30Updated last year
- To clean up your AWS AMIs: First, include AMIs by name or tag. Second, exclude AMIs in use, younger than N days, or the newest N images. …☆34Updated 2 weeks ago
- CLI to prevent malicious Terraform Providers from being executed. You can define the allow list of Terraform Providers and their versions…☆86Updated this week
- CloudSplaining on AWS Managed Policies☆44Updated last week
- List of vendors that do not allow IMDSv2 enforcement☆143Updated last year
- Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Security Management.☆31Updated 8 months ago
- KYE: Know Your Enemies - Check external access on your AWS account☆121Updated 2 months ago
- Runs IAM policy linting and security checks against either a single AWS account or a set of member accounts of an AWS Organization.☆145Updated 2 weeks ago
- ☆29Updated 8 months ago
- Analyzes CloudTrail data of a given AWS account and generates a summary of recently active IAM principals, API calls they made, as well a…☆163Updated 3 months ago
- Is your AWS perimeter secure? Use Powerpipe and Steampipe to check your AWS accounts for public resources, resources shared with untrust…☆111Updated this week
- Validate all your Customer IAM Policies against AWS Access Analyzer - Policy Validation☆43Updated 4 years ago
- AWS VPC Subnets Watcher☆77Updated last year
- Simple plug-and-play Github Action to block unauthorized outbound traffic (egress) in your Github workflows☆110Updated this week
- Collect IAM information from all your AWS organization, accounts, and resources.☆36Updated last week