salesforce / cloudsplaining
Cloudsplaining is an AWS IAM Security Assessment tool that identifies violations of least privilege and generates a risk-prioritized report.
☆2,042Updated this week
Alternatives and similar repositories for cloudsplaining:
Users that are interested in cloudsplaining are comparing it to the libraries listed below
- IAM Least Privilege Policy Generator☆2,052Updated 2 weeks ago
- A tool for quickly evaluating IAM permissions in AWS.☆1,453Updated 6 months ago
- AWS IAM linting library☆1,063Updated 6 months ago
- CloudTracker helps you find over-privileged IAM users and roles by comparing CloudTrail logs with current IAM policies.☆892Updated 3 years ago
- ElectricEye is a multi-cloud, multi-SaaS Python CLI tool for Asset Management, Security Posture Management & Attack Surface Monitoring su…☆976Updated this week
- AWS Least Privilege for Distributed, High-Velocity Deployment☆1,128Updated last year
- A graph-based tool for visualizing effective access and resource relationships in AWS environments.☆935Updated 2 years ago
- A command-line tool to get valuable information out of AWS CloudTrail☆806Updated this week
- Multi-threaded AWS inventory collection tool with a focus on security-relevant resources and metadata.☆538Updated last month
- Discover resources created in an AWS account.☆716Updated 10 months ago
- Cloud Security Suite - One stop tool for auditing the security posture of AWS/GCP/Azure infrastructure.☆1,149Updated 2 years ago
- Terraform module to set up your AWS account with the secure baseline configuration based on CIS Amazon Web Services Foundations and AWS F…☆1,157Updated 7 months ago
- Cloud Security Posture Management (CSPM)☆3,428Updated last week
- Visualize your aws security groups.☆707Updated this week
- Multi-Cloud Security Auditing Tool☆6,940Updated 3 months ago
- [MAMIP] Monitor AWS Managed IAM Policies Changes☆479Updated this week
- Fetch all public IP addresses tied to your AWS account. Works with IPv4/IPv6, Classic/VPC networking, and across all AWS services☆638Updated 3 years ago
- A tool for standing up (and tearing down!) purposefully insecure cloud infrastructure☆683Updated last year
- PacBot (Policy as Code Bot)☆1,293Updated 2 years ago
- A centralized source of all AWS IAM privilege escalation methods released by Rhino Security Labs.☆903Updated 5 years ago
- Generate an IAM policy from AWS, Azure, or Google Cloud (GCP) calls using client-side monitoring (CSM) or embedded proxy☆3,190Updated last week
- Guard offers a policy-as-code domain-specific language (DSL) to write rules and validate JSON- and YAML-formatted data such as CloudForma…☆1,319Updated this week
- An AWS tool to help you create a point in time assessment of your AWS account using Prowler.☆529Updated 3 months ago
- Linting tool for CloudFormation templates☆1,263Updated 6 months ago
- Bare minimum AWS Security Alerting and Configuration☆471Updated this week
- [Node, Python, Java] Repository of sample Custom Rules for AWS Config.☆1,671Updated last month
- Regula checks infrastructure as code templates (Terraform, CloudFormation, k8s manifests) for AWS, Azure, Google Cloud, and Kubernetes se…☆963Updated 5 months ago
- Parse and Process AWS IAM Policies, Statements, ARNs, and wildcards.☆429Updated 7 months ago
- Security auditing tool for AWS environments