sercasti / aws-hardening
Best practices for hardening your AWS account, most of them are free
☆36Updated last year
Alternatives and similar repositories for aws-hardening
Users that are interested in aws-hardening are comparing it to the libraries listed below
Sorting:
- A Lambda function for Resource Tagging Automation☆51Updated 8 months ago
- ☆39Updated 3 years ago
- ☆41Updated last year
- This solutions facilitates rapid deployment of Prowler, full AWS Organization analysis, and finding processing as part of a security post…☆57Updated 5 months ago
- AWS IAM Permissions Guardrails https://aws-samples.github.io/aws-iam-permissions-guardrails/☆124Updated 2 years ago
- ☆34Updated 2 years ago
- Identify all permitted data paths originating from the Internet to Network Interfaces within AWS Accounts across the entire AWS Organizat…☆39Updated last year
- ☆21Updated 2 years ago
- ☆32Updated 10 months ago
- Safer AWS SCP deployments via real-time monitoring☆51Updated last year
- SCP management tool☆131Updated last year
- Pre-configured response & remediation playbooks for AWS Security Hub☆65Updated 3 years ago
- AWS SSO Reporter☆54Updated last week
- Export / Import your AWS Organizational Structure and Policies - Attach & Validate your SCPs☆26Updated last year
- Hands-on workshop on how to build security automation in pipelines☆37Updated last year
- Sample CloudFormation templates and architecture for AWS Control Tower☆28Updated last year
- A collection of useful queries that can be used to verify compliance/security across your AWS assets☆31Updated 5 years ago
- bash functions to help run aws-cli commands across roles in multiple accounts with MFA☆68Updated 5 years ago
- This package provides an easy way to create a refreshable boto3 Session with AWS Roles Anywhere.☆57Updated this week
- This is a collection of AWS CloudFormation templates which create Lambda functions triggered by CloudWatch Events rule to evaluate AWS AP…☆52Updated 6 years ago
- This solution is intended for enterprises that need a streamlined way of managing user access to their AWS accounts. Using this solution,…☆69Updated last month
- ☆20Updated 2 years ago
- Example policies demonstrating how to implement a data perimeter on AWS.☆156Updated 3 weeks ago
- Crowdsourced list of sensitive IAM Actions☆145Updated 6 months ago
- To clean up your AWS AMIs: First, include AMIs by name or tag. Second, exclude AMIs in use, younger than N days, or the newest N images. …☆34Updated last month
- ☆19Updated 10 months ago
- Collection of semi-useful Service Control Policies and scripts to manage them☆97Updated 3 months ago
- Uses the AWS Cloud Control API to list resources that are present in a given AWS account and region(s). Discovered resources are written …☆174Updated last week
- Collection of samples for Management and Governance services☆67Updated 2 weeks ago
- ☆88Updated last year