siigil / entra-id-terraform
Examples of various Entra ID scenarios in Terraform
☆16Updated 7 months ago
Alternatives and similar repositories for entra-id-terraform
Users that are interested in entra-id-terraform are comparing it to the libraries listed below
Sorting:
- Generates runbooks for GuardDuty findings☆35Updated 10 months ago
- ☆29Updated 6 months ago
- ☆41Updated last year
- The Amazon Elastic Kubernetes Service (EKS) Creation Engine (ECE) is a Python command-line program created by the Lightspin Office of the…☆40Updated 2 years ago
- This Terraform module consists of the configuration for automating the remediation of AWS EC2 vulnerabilities using AWS Inspector finding…☆46Updated 3 months ago
- Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Security Management.☆31Updated 6 months ago
- CloudSplaining on AWS Managed Policies☆43Updated this week
- Detect publicly accessible Lambda Function URLs in your AWS account☆9Updated 3 years ago
- Cross cloud workload identity research and workshops☆37Updated 2 weeks ago
- Python script to analyze and extract all Security Groups information☆43Updated 11 months ago
- TrailAlerts is a AWS-native, serverless cloud-detection tool that lets you define simple rules as code and get rich alerts about events i…☆15Updated last week
- Convert cloudtrail data to MITRE ATT&CK Sightings☆80Updated 2 years ago
- Scripts to quickly fix security and compliance issues☆26Updated last year
- https://breaches.cloud☆39Updated 6 months ago
- Compares and analyzes GCP IAM roles.☆77Updated 2 months ago
- Coalfire AWS RAMP/pak Reference Architecture☆36Updated 8 months ago
- ☆29Updated 6 months ago
- ☆40Updated 6 months ago
- ☆11Updated 4 years ago
- ☆117Updated last month
- ☆41Updated 2 months ago
- ☆30Updated last month
- Identify all permitted data paths originating from the Internet to Network Interfaces within AWS Accounts across the entire AWS Organizat…☆39Updated last year
- ☆48Updated 6 months ago
- ThreatModel for Azure Storage - Library of all the attack scenarios on Azure Storage, and how to mitigate them following a risk-based app…☆59Updated last year
- AWS honey token manager☆87Updated 9 months ago
- To clean up your AWS AMIs: First, include AMIs by name or tag. Second, exclude AMIs in use, younger than N days, or the newest N images. …☆34Updated 3 weeks ago
- Safer AWS SCP deployments via real-time monitoring☆51Updated last year
- Listing of resources for example AWS Service Control Policies (SCPs)☆17Updated last year
- Cloud threat detection visualization from excalidraw☆12Updated 3 years ago