sriddell / ecr-cve-monitorLinks
☆18Updated 2 years ago
Alternatives and similar repositories for ecr-cve-monitor
Users that are interested in ecr-cve-monitor are comparing it to the libraries listed below
Sorting:
- AWS managed IAM policies☆128Updated 3 years ago
 - Demonstrates sending AWS findings to your Slack Channel☆60Updated 2 years ago
 - Audit IAM roles and users using Access Advisor data using Python/boto3 SDK and automatically create IAM permissions boundaries to limit a…☆38Updated 5 years ago
 - Automate the AWS GuardDuty account invitation lifecycle for all of your organizations AWS accounts in all regions as well as aggregate an…☆67Updated 2 years ago
 - Example container image re-scan with Amazon ECR☆49Updated 4 years ago
 - InSpec profile to validate your VPC to the standards of the CIS Amazon Web Services Foundations Benchmark☆77Updated 2 months ago
 - An AWS config rule that uses IAM Access Advisor to find over-permissioned IAM users, groups, and roles.☆17Updated 6 years ago
 - A small lambda script that will disable access keys older than a given amount of days.☆153Updated 2 years ago
 - ☆83Updated 4 years ago
 - Public tables and other research that can accept PRs. Please visit the web link.☆44Updated 6 years ago
 - A collection of useful queries that can be used to verify compliance/security across your AWS assets☆29Updated 6 years ago
 - Collection of semi-useful Service Control Policies and scripts to manage them☆101Updated 9 months ago
 - PolicyGlass allows you to analyse one or more AWS policies' effective permissions in aggregate, by restating them in the form of PolicySh…☆60Updated 3 years ago
 - Automatically compile an AWS Service Control Policy that ONLY allows AWS services that are compliant with your preferred compliance frame…☆225Updated 2 years ago
 - bash functions to help run aws-cli commands across roles in multiple accounts with MFA☆69Updated 5 years ago
 - ☆31Updated 3 months ago
 - The open source version of the AWS Control Tower docs. You can submit feedback & requests for changes by submitting issues in this repo o…☆28Updated 2 years ago
 - ☆63Updated last year
 - Validate all your Customer IAM Policies against AWS Access Analyzer - Policy Validation☆43Updated 4 years ago
 - Glue workflow to convert CloudTrail logs to Athena-friendly Parquet format☆48Updated last year
 - Github action for linting AWS IAM policy documents☆38Updated 2 years ago
 - Code examples for the AWS Security Blog post: How to use CI/CD to deploy and configure AWS security services with Terraform☆97Updated 4 years ago
 - A Workshop for AWS Security Hub Integration, Prioritization, and Response☆72Updated last year
 - Cloudformation Template and Lambda to detect if Instance Profile credentials are being used outside your AWS Account.☆29Updated 6 years ago
 - Run compliance and security controls to detect Terraform AWS resources deviating from security best practices prior to deployment using P…☆27Updated 2 months ago
 - Manheim's Cloud Custodian (c7n) wrapper package, policy generator, runner, and supporting tools.☆47Updated 8 months ago
 - Lambda job in Python to automatically patch EC2 instances when an inspector assessment generates a CVE finding☆60Updated 7 years ago
 - Workshop exercise materials for re:Invent 2017 - SID 341: Using AWS CloudTrail Logs for Scalable, Automated Anomaly Detection☆54Updated 6 years ago
 - Automate the daily partitioning of your CloudTrail bucket in Athena☆28Updated 2 years ago
 - SSH-Restricted deploys an SSH compliance rule (AWS Config) with auto-remediation via AWS Lambda if SSH access is public.☆30Updated 4 years ago