sriddell / ecr-cve-monitor
☆18Updated last year
Alternatives and similar repositories for ecr-cve-monitor:
Users that are interested in ecr-cve-monitor are comparing it to the libraries listed below
- Example of how to run the Clair image scanner on AWS ECS Fargate☆27Updated 6 years ago
- ☆79Updated 3 years ago
- InSpec profile to validate your VPC to the standards of the CIS Amazon Web Services Foundations Benchmark☆78Updated 2 weeks ago
- Sample code for integrating AWS CloudFormation templates security tests (using CFN-Nag and CFN-Guard) with both AWS Security Hub and AWS …☆22Updated 9 months ago
- An example of using Sentinel policies in VCS in Terraform Enterprise☆26Updated last year
- PolicyGlass allows you to analyse one or more AWS policies' effective permissions in aggregate, by restating them in the form of PolicySh…☆59Updated 3 years ago
- Github action for linting AWS IAM policy documents☆36Updated last year
- Create a Golden AMI Pipeline integrated with a Qualys Scanner for vulnerability assessments☆18Updated 5 years ago
- Demonstrates sending AWS findings to your Slack Channel☆56Updated last year
- Automate the AWS GuardDuty account invitation lifecycle for all of your organizations AWS accounts in all regions as well as aggregate an…☆66Updated last year
- Validate all your Customer IAM Policies against AWS Access Analyzer - Policy Validation☆43Updated 3 years ago
- bash functions to help run aws-cli commands across roles in multiple accounts with MFA☆68Updated 5 years ago
- An AWS config rule that uses IAM Access Advisor to find over-permissioned IAM users, groups, and roles.☆16Updated 5 years ago
- This ansible role gets information from an AWS VPC and generate a graphical representation of security groups☆103Updated 4 years ago
- Example container image re-scan with Amazon ECR☆50Updated 3 years ago
- Sample CloudFormation templates and architecture for AWS Control Tower☆28Updated last year
- Audit IAM roles and users using Access Advisor data using Python/boto3 SDK and automatically create IAM permissions boundaries to limit a…☆37Updated 4 years ago
- Show the history and changes between configuration versions of AWS resources☆69Updated 5 years ago
- (WIP) A terraform / kitchen-terraform hardening baseline for the cis-aws-foundations-baseline☆24Updated 2 years ago
- Example code for setting up CIS Benchmarks using EventBridge☆19Updated 2 years ago
- The open source version of the AWS Control Tower docs. You can submit feedback & requests for changes by submitting issues in this repo o…☆27Updated last year
- ☆60Updated 2 months ago
- Pre-configured response & remediation playbooks for AWS Security Hub☆65Updated 3 years ago
- A static analysis tool for Terraform plans.☆45Updated 2 years ago
- Workshop exercise materials for re:Invent 2017 - SID 341: Using AWS CloudTrail Logs for Scalable, Automated Anomaly Detection☆51Updated 5 years ago
- Public tables and other research that can accept PRs. Please visit the web link.☆44Updated 5 years ago
- SSH-Restricted deploys an SSH compliance rule (AWS Config) with auto-remediation via AWS Lambda if SSH access is public.☆30Updated 3 years ago
- [WORK IN PROGRESS] A repo containing rule sets for cloud-custodian inside GSA AWS accounts. This repo does not contain cloud-custodian it…☆29Updated 7 years ago