sercasti / aws-hardeningLinks
Best practices for hardening your AWS account, most of them are free
☆36Updated last year
Alternatives and similar repositories for aws-hardening
Users that are interested in aws-hardening are comparing it to the libraries listed below
Sorting:
- This solutions facilitates rapid deployment of Prowler, full AWS Organization analysis, and finding processing as part of a security post…☆59Updated 3 weeks ago
- Hands-on workshop on how to build security automation in pipelines☆37Updated last year
- ☆21Updated 2 years ago
- CloudCustodian Rules engine for cloud security and governance, DSL in yaml for policies to query, filter, and take actions on resources☆20Updated last year
- A collection of useful queries that can be used to verify compliance/security across your AWS assets☆31Updated 6 years ago
- SCP management tool☆132Updated last year
- Sample code for integrating AWS CloudFormation templates security tests (using CFN-Nag and CFN-Guard) with both AWS Security Hub and AWS …☆24Updated last year
- Identify all permitted data paths originating from the Internet to Network Interfaces within AWS Accounts across the entire AWS Organizat…☆39Updated last year
- AWS IAM Permissions Guardrails https://aws-samples.github.io/aws-iam-permissions-guardrails/☆124Updated 2 years ago
- This package provides an easy way to create a refreshable boto3 Session with AWS Roles Anywhere.☆57Updated last month
- Collection of semi-useful Service Control Policies and scripts to manage them☆98Updated 4 months ago
- ☆34Updated 3 years ago
- ☆32Updated 11 months ago
- Pre-configured response & remediation playbooks for AWS Security Hub☆65Updated 3 years ago
- Terraform modules for an EC2 Image Builder Pipeline with an Amazon Linux 2 Baseline Container Recipe, which is used to deploy a Docker ba…☆42Updated 2 years ago
- ☆39Updated 3 years ago
- Safer AWS SCP deployments via real-time monitoring☆53Updated last year
- AWS SSO Reporter☆54Updated last month
- This repository contains a sample IAM permissions boundary as a starting point for creating your own permissions boundary to meet the s…☆82Updated 4 months ago
- This is a collection of AWS CloudFormation templates which create Lambda functions triggered by CloudWatch Events rule to evaluate AWS AP…☆52Updated 6 years ago
- To clean up your AWS AMIs: First, include AMIs by name or tag. Second, exclude AMIs in use, younger than N days, or the newest N images. …☆34Updated last week
- This solution supports a bidirectional integration between Security Hub and JIRA. Issues can be either created automatically or manually …☆39Updated 10 months ago
- ☆20Updated 2 years ago
- Example policies demonstrating how to implement a data perimeter on AWS.☆165Updated last week
- Crowdsourced list of sensitive IAM Actions☆150Updated 7 months ago
- A Lambda function for Resource Tagging Automation☆51Updated 10 months ago
- ☆52Updated 2 years ago
- ☆18Updated 2 years ago
- ☆57Updated last year
- Automated Amazon GuardDuty Security Response☆27Updated 6 months ago