raajheshkannaa / auto-close-aws-accountsLinks
Automatically close AWS Accounts when moved to a specific Organizational Unit, such as SuspendedOU or ToBeDeletedOU or BlackHole π
β14Updated 3 years ago
Alternatives and similar repositories for auto-close-aws-accounts
Users that are interested in auto-close-aws-accounts are comparing it to the libraries listed below
Sorting:
- Is your AWS perimeter secure? Use Powerpipe and Steampipe to check your AWS accounts for public resources, resources shared with untrustβ¦β112Updated last month
- A cloud security tool to search and clean up unused AWS access keys, written in Go.β51Updated 3 years ago
- Stop EC2 instances and RDS/Aurora databases overnight by tagging them with cron schedules, to cut AWS costs. Trigger CloudFormation stackβ¦β63Updated this week
- Lambda Extension for iamliveβ42Updated 4 years ago
- Python library for examining, creating and optimising IAM policiesβ22Updated 3 years ago
- cli tool to read any resource off of AWS API. Also generates Terraform import-blocks, and actual Terraform Resource code.β143Updated 8 months ago
- Centralizing AWS CloudWatch log forwarding via EventBridge and Step Functionsβ48Updated 2 years ago
- AWS VPC Subnets Watcherβ79Updated 2 years ago
- SCP management toolβ134Updated last year
- Repository for iamfast questions and issuesβ175Updated 6 months ago
- Expand IAM Actions with Wildcardsβ33Updated this week
- Collect IAM information from all your AWS organization, accounts, and resources.β59Updated last week
- A crowdsourced AWS IAM permissions reference.β99Updated 2 months ago
- β23Updated 2 years ago
- A schema and set of tools for using SQL to query cloud infrastructure.β65Updated 4 years ago
- PolicyGlass allows you to analyse one or more AWS policies' effective permissions in aggregate, by restating them in the form of PolicyShβ¦β60Updated 3 years ago
- Validate all your Customer IAM Policies against AWS Access Analyzer - Policy Validationβ43Updated 4 years ago
- rpCheckup is an AWS resource policy security checkup tool that identifies public, external account access, intra-org account access, β¦β162Updated 4 years ago
- Crowdsourced list of sensitive IAM Actionsβ154Updated 11 months ago
- Safer AWS SCP deployments via real-time monitoringβ56Updated 2 years ago
- Runs IAM policy linting and security checks against either a single AWS account or multiple member accounts of an AWS Organization.β150Updated 2 months ago
- Access Undenied parses AWS AccessDenied CloudTrail events, explains the reasons for them, and offers actionable remediation steps. Open-sβ¦β264Updated 2 years ago
- Python script for AWS resources inventory (cheaper than AWS Config)β169Updated 4 months ago
- AWS SSO Reporterβ54Updated 5 months ago
- β63Updated 11 months ago
- Make AWS IAM policies smaller by adding wildcards to actions.β19Updated this week
- Tools to help automate your AWS Accountsβ101Updated last year
- EC2 instance running Former2 for generating IaC scripts from existing AWS resources with temporary security credentialsβ29Updated 2 months ago
- Blazing CloudTrail since 2018β138Updated 6 years ago
- CloudSplaining on AWS Managed Policiesβ44Updated last month