ovotech / cloud-key-rotatorLinks
A Golang program to rotate AWS & GCP account keys
☆67Updated 9 months ago
Alternatives and similar repositories for cloud-key-rotator
Users that are interested in cloud-key-rotator are comparing it to the libraries listed below
Sorting:
- AWS honey token manager☆89Updated last year
- A cloud security tool to search and clean up unused AWS access keys, written in Go.☆52Updated 3 years ago
- Crowdsourced list of sensitive IAM Actions☆159Updated last year
- PolicyGlass allows you to analyse one or more AWS policies' effective permissions in aggregate, by restating them in the form of PolicySh…☆60Updated 4 years ago
- Safer AWS SCP deployments via real-time monitoring☆56Updated 2 years ago
- AWS SSO Reporter☆55Updated 9 months ago
- Compares and analyzes GCP IAM roles.☆78Updated 11 months ago
- An IAM Simulator that outputs detailed explains of how a request was evaluated.☆97Updated last week
- ☆124Updated 8 months ago
- Analyzes CloudTrail data of a given AWS account and generates a summary of recently active IAM principals, API calls they made, as well a…☆165Updated last month
- Collect IAM information from all your AWS organization, accounts, and resources.☆85Updated this week
- Validate all your Customer IAM Policies against AWS Access Analyzer - Policy Validation☆43Updated 4 years ago
- ☆228Updated 2 weeks ago
- prel(iminary) is an application that temporarily assigns Google Cloud IAM Roles and includes an approval process.☆45Updated last week
- Runs IAM policy linting and security checks against either a single AWS account or multiple member accounts of an AWS Organization.☆151Updated last month
- AWS VPC Subnets Watcher☆79Updated 2 years ago
- Scripts to quickly fix security and compliance issues☆28Updated this week
- Is your AWS perimeter secure? Use Powerpipe and Steampipe to check your AWS accounts for public resources, resources shared with untrust…☆114Updated 5 months ago
- KYE: Know Your Enemies - Check external access on your AWS account☆129Updated 9 months ago
- CLI to prevent malicious Terraform Providers from being executed. You can define the allow list of Terraform Providers and their versions…☆88Updated this week
- List of vendors that do not allow IMDSv2 enforcement☆143Updated last year
- CloudSplaining on AWS Managed Policies☆44Updated 5 months ago
- This Terraform module consists of the configuration for automating the remediation of AWS EC2 vulnerabilities using AWS Inspector finding…☆49Updated 7 months ago
- A library of rules for Conftest used to detect misconfigurations within Terraform configuration files☆190Updated 3 years ago
- Open-source proof-of-concept client for AWS IAM Roles Anywhere☆71Updated 3 years ago
- ☆31Updated last year
- The Amazon Elastic Kubernetes Service (EKS) Creation Engine (ECE) is a Python command-line program created by the Lightspin Office of the…☆42Updated 3 years ago
- SCP management tool☆135Updated 2 years ago
- use 'balcony' to read any/each AWS resource available + generate Terraform code for them☆147Updated last month
- Prevent SSRF attacks on AWS EC2 via automated upgrades to the more secure Instance Metadata Service v2 (IMDSv2).☆143Updated 9 months ago