IAM Least Privilege Policy Generator
☆2,142Apr 6, 2026Updated 2 weeks ago
Alternatives and similar repositories for policy_sentry
Users that are interested in policy_sentry are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Cloudsplaining is an AWS IAM Security Assessment tool that identifies violations of least privilege and generates a risk-prioritized repo…☆2,202Updated this week
- AWS IAM linting library☆1,114Jan 7, 2026Updated 3 months ago
- A command-line tool to get valuable information out of AWS CloudTrail☆833Apr 13, 2026Updated last week
- AWS Least Privilege for Distributed, High-Velocity Deployment☆1,144Nov 24, 2025Updated 4 months ago
- CloudTracker helps you find over-privileged IAM users and roles by comparing CloudTrail logs with current IAM policies.☆912Dec 17, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A tool for quickly evaluating IAM permissions in AWS.☆1,551Aug 2, 2024Updated last year
- Parse and Process AWS IAM Policies, Statements, ARNs, and wildcards.☆447Jun 21, 2024Updated last year
- CloudMapper helps you analyze your Amazon Web Services (AWS) environments.☆6,278Jul 15, 2024Updated last year
- Generate an IAM policy from AWS, Azure, or Google Cloud (GCP) calls using client-side monitoring (CSM) or embedded proxy☆3,360Nov 13, 2025Updated 5 months ago
- List of open source tools for AWS security: defensive, offensive, auditing, DFIR, etc.☆9,431Oct 16, 2025Updated 6 months ago
- Rules engine for cloud security, cost optimization, and governance, DSL in yaml for policies to query, filter, and take actions on resour…☆5,966Updated this week
- A vault for securely storing and accessing AWS credentials in development environments☆8,968Dec 30, 2025Updated 3 months ago
- Cartography is a Python tool that pulls infrastructure assets and their relationships into a Neo4j graph database.☆3,829Updated this week
- Automatically compile an AWS Service Control Policy that ONLY allows AWS services that are compliant with your preferred compliance frame…☆224Aug 11, 2023Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Multi-threaded AWS inventory collection tool with a focus on security-relevant resources and metadata.☆552Jul 13, 2025Updated 9 months ago
- Prowler is the world’s most widely used open-source cloud security platform that automates security and compliance across any cloud envir…☆13,583Updated this week
- Aardvark is a multi-account AWS IAM Access Advisor API☆484Oct 25, 2024Updated last year
- Access Undenied parses AWS AccessDenied CloudTrail events, explains the reasons for them, and offers actionable remediation steps. Open-s…☆268Apr 13, 2026Updated last week
- The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.☆5,136Mar 30, 2026Updated 3 weeks ago
- A Central Control Plane for AWS Permissions and Access☆3,197Mar 3, 2026Updated last month
- ElectricEye is a multi-cloud, multi-SaaS Python CLI tool for Asset Management, Security Posture Management & Attack Surface Monitoring su…☆1,036Feb 9, 2026Updated 2 months ago
- Resource types that can be publicly exposed on AWS