primeharbor / aws-fast-fixes
Scripts to quickly fix security and compliance issues
☆25Updated last year
Alternatives and similar repositories for aws-fast-fixes:
Users that are interested in aws-fast-fixes are comparing it to the libraries listed below
- Safer AWS SCP deployments via real-time monitoring☆49Updated last year
- ☆22Updated last year
- CloudSplaining on AWS Managed Policies☆41Updated this week
- PolicyGlass allows you to analyse one or more AWS policies' effective permissions in aggregate, by restating them in the form of PolicySh…☆59Updated 3 years ago
- AWS SSO Reporter☆54Updated last year
- Convert cloudtrail data to MITRE ATT&CK Sightings☆79Updated 2 years ago
- Generates runbooks for GuardDuty findings☆35Updated 6 months ago
- ☆37Updated 11 months ago
- Identify all permitted data paths originating from the Internet to Network Interfaces within AWS Accounts across the entire AWS Organizat…☆36Updated last year
- Coalfire AWS RAMP/pak Reference Architecture☆36Updated 4 months ago
- Deliberately vulnerable AWS resources for security assessment demos☆31Updated 2 years ago
- A cloud security tool to search and clean up unused AWS access keys, written in Go.☆49Updated 2 years ago
- https://breaches.cloud☆36Updated 3 months ago
- Compares and analyzes GCP IAM roles.☆77Updated 7 months ago
- Example code for setting up CIS Benchmarks using EventBridge☆19Updated 2 years ago
- Glue workflow to convert CloudTrail logs to Athena-friendly Parquet format☆47Updated 8 months ago
- SCP management tool☆129Updated last year
- Crowdsourced list of sensitive IAM Actions☆140Updated 2 months ago
- AWS docs, guides, and other tools☆76Updated last year
- ☆21Updated last year
- Open-source proof-of-concept client for AWS IAM Roles Anywhere☆71Updated 2 years ago
- ☆152Updated last year
- Cloudformation Template and Lambda to detect if Instance Profile credentials are being used outside your AWS Account.☆28Updated 5 years ago
- ☆111Updated this week
- Publicly-listed AWS account IDs for easy lookup. Great for cleaning up false positives from unknown Account IDs in Cloudtrail☆38Updated 7 months ago
- The Amazon Elastic Kubernetes Service (EKS) Creation Engine (ECE) is a Python command-line program created by the Lightspin Office of the…☆40Updated 2 years ago
- Validate all your Customer IAM Policies against AWS Access Analyzer - Policy Validation☆43Updated 3 years ago
- A collection of useful queries that can be used to verify compliance/security across your AWS assets☆31Updated 5 years ago
- Expand IAM Actions with Wildcards☆27Updated 3 weeks ago
- Create a Neo4J graph of users and roles trust policies within an AWS Organization.☆26Updated last year