seifrajhi / eks-auditing-bot-moduleLinks
Terraform module to set up alerts detecting manual actions using SNS. Monitors EKS Audit Logs and notifies subscribed operators when manual changes occur in the cluster
☆11Updated 2 years ago
Alternatives and similar repositories for eks-auditing-bot-module
Users that are interested in eks-auditing-bot-module are comparing it to the libraries listed below
Sorting:
- Runs IAM policy linting and security checks against either a single AWS account or multiple member accounts of an AWS Organization.☆151Updated last month
- Terraform module to perform security assessment in AWS Organizations using Prowler on AWS Fargate.☆15Updated 2 years ago
- ☆42Updated 2 years ago
- SCP management tool☆135Updated 2 years ago
- Implements OPA-based preventive security controls for AWS Infrastructure using Terraform Infrastructure as Code (IaC), that can establish…☆47Updated 2 years ago
- All-in-one auditing toolkit for identifying common security issues in managed Kubernetes environments. Currently supports Amazon EKS.☆369Updated 6 months ago
- AWS VPC Subnets Watcher☆79Updated 2 years ago
- Slack bot to temporary assign AWS SSO Permission set to a user☆54Updated last month
- ☆142Updated 2 months ago
- Example policies demonstrating how to implement a data perimeter on AWS.☆190Updated 2 weeks ago
- Automated Amazon EKS cluster upgrade☆159Updated last year
- Set of standalone and reusable AWS/DevOps solutions implemented as Terraform modules 🇺🇦☆76Updated 2 years ago
- Crowdsourced list of sensitive IAM Actions☆159Updated last year
- Uses the AWS Cloud Control API to list resources that are present in a given AWS account and region(s). Discovered resources are written …☆182Updated last month
- This repository contains a sample IAM permissions boundary as a starting point for creating your own permissions boundary to meet the s…☆90Updated 11 months ago
- Terraform module to provision Service Control Policies (SCP) for AWS Organizations, Organizational Units, and AWS accounts☆56Updated 2 months ago
- A command line tool that validates AWS IAM Policies in a Terraform template against AWS IAM best practices☆342Updated 8 months ago
- Collection of example Service Control Policies (SCPs) that are useful for sandbox and training AWS accounts.☆161Updated last month
- Required tags validation on terraform resources☆48Updated this week
- Script to collect Pod related information from EKS Cluster☆16Updated 11 months ago
- Kickstart and manage your AWS Organization via Terraform☆118Updated 2 weeks ago
- A cloud security tool to search and clean up unused AWS access keys, written in Go.☆52Updated 3 years ago
- Get notified when actions are taken in the AWS Console.☆329Updated last year
- Terraform module for serverless certificate authority on AWS☆160Updated this week
- A Kubectl plugin that can detect if any of your workloads or manifest files are mounting the docker.sock volume☆178Updated 2 months ago
- The latest and greatest on all things AWS Elastic Kubernetes Service, Kubernetes, and Cloud Native. Keeping up with what’s happening so y…☆46Updated 2 weeks ago
- A Dashboard for AWS ECR usage based on CloudWatch log insight queries☆70Updated last year
- Collection of semi-useful Service Control Policies and scripts to manage them☆101Updated last year
- ☆24Updated 5 years ago
- Rego policies for enterprise-scale Compliance-as-Code with OPA Conftest.☆60Updated 2 years ago