primeharbor / aws-fast-fixes
Scripts to quickly fix security and compliance issues
☆25Updated last year
Alternatives and similar repositories for aws-fast-fixes:
Users that are interested in aws-fast-fixes are comparing it to the libraries listed below
- Safer AWS SCP deployments via real-time monitoring☆50Updated last year
- CloudSplaining on AWS Managed Policies☆41Updated this week
- Generates runbooks for GuardDuty findings☆35Updated 7 months ago
- ☆22Updated 2 years ago
- Coalfire AWS RAMP/pak Reference Architecture☆36Updated 5 months ago
- AWS SSO Reporter☆54Updated last year
- Deliberately vulnerable AWS resources for security assessment demos☆31Updated 2 years ago
- Convert cloudtrail data to MITRE ATT&CK Sightings☆79Updated 2 years ago
- PolicyGlass allows you to analyse one or more AWS policies' effective permissions in aggregate, by restating them in the form of PolicySh…☆59Updated 3 years ago
- ☆28Updated 3 months ago
- ☆38Updated last year
- Cloudformation Template and Lambda to detect if Instance Profile credentials are being used outside your AWS Account.☆28Updated 5 years ago
- Identify all permitted data paths originating from the Internet to Network Interfaces within AWS Accounts across the entire AWS Organizat…☆37Updated last year
- Detect publicly accessible Lambda Function URLs in your AWS account☆9Updated 2 years ago
- Listing of resources for example AWS Service Control Policies (SCPs)☆16Updated last year
- Compares and analyzes GCP IAM roles.☆77Updated 8 months ago
- A cloud security tool to search and clean up unused AWS access keys, written in Go.☆50Updated 2 years ago
- To clean up your AWS AMIs: First, include AMIs by name or tag. Second, exclude AMIs in use, younger than N days, or the newest N images. …☆33Updated this week
- ☆21Updated last year
- ☆26Updated 3 months ago
- A collection of useful queries that can be used to verify compliance/security across your AWS assets☆31Updated 5 years ago
- https://breaches.cloud☆38Updated 4 months ago
- Crowdsourced list of sensitive IAM Actions☆141Updated 3 months ago
- Validate all your Customer IAM Policies against AWS Access Analyzer - Policy Validation☆43Updated 3 years ago
- A toolset to juggle AWS roles for persistent access☆53Updated 6 months ago
- ☆33Updated 2 years ago
- CDK app to setup an isolated AWS network to experiment with ways of exfiltrating data☆18Updated 3 years ago
- AWS docs, guides, and other tools☆76Updated 2 years ago
- Assess certain AWS network configurations☆11Updated 6 years ago
- SCP management tool☆130Updated last year