sriddell / ecr-cve-monitorLinks
☆18Updated 2 years ago
Alternatives and similar repositories for ecr-cve-monitor
Users that are interested in ecr-cve-monitor are comparing it to the libraries listed below
Sorting:
- AWS managed IAM policies☆128Updated 3 years ago
- Example of how to run the Clair image scanner on AWS ECS Fargate☆27Updated 6 years ago
- Audit IAM roles and users using Access Advisor data using Python/boto3 SDK and automatically create IAM permissions boundaries to limit a…☆37Updated 4 years ago
- Automate the AWS GuardDuty account invitation lifecycle for all of your organizations AWS accounts in all regions as well as aggregate an…☆67Updated 2 years ago
- InSpec profile to validate your VPC to the standards of the CIS Amazon Web Services Foundations Benchmark☆78Updated 7 months ago
- ☆82Updated 4 years ago
- PolicyGlass allows you to analyse one or more AWS policies' effective permissions in aggregate, by restating them in the form of PolicySh…☆60Updated 3 years ago
- Demonstrates sending AWS findings to your Slack Channel☆60Updated last year
- Sample code for integrating AWS CloudFormation templates security tests (using CFN-Nag and CFN-Guard) with both AWS Security Hub and AWS …☆24Updated last year
- InSpec AWS Resource Pack https://www.inspec.io/☆146Updated 2 weeks ago
- (WIP) A terraform / kitchen-terraform hardening baseline for the cis-aws-foundations-baseline☆24Updated 3 years ago
- ☆63Updated 9 months ago
- Public tables and other research that can accept PRs. Please visit the web link.☆44Updated 5 years ago
- A Workshop for AWS Security Hub Integration, Prioritization, and Response☆72Updated last year
- CloudFormation Templates to deploy CoreOS Clair and Nginx Website on ECS Fargate as an ECS Service. Also create a CodePipeline for updati…☆35Updated 6 years ago
- Collection of semi-useful Service Control Policies and scripts to manage them☆99Updated 6 months ago
- Useful scripts for maintaining multiple AWS Accounts☆45Updated 4 months ago
- A collection of useful queries that can be used to verify compliance/security across your AWS assets☆30Updated 6 years ago
- Github action for linting AWS IAM policy documents☆38Updated 2 years ago
- bash functions to help run aws-cli commands across roles in multiple accounts with MFA☆68Updated 5 years ago
- Workshop exercise materials for re:Invent 2017 - SID 341: Using AWS CloudTrail Logs for Scalable, Automated Anomaly Detection☆52Updated 6 years ago
- Pre-configured response & remediation playbooks for AWS Security Hub☆65Updated 3 years ago
- ☆30Updated 3 weeks ago
- Sample CloudFormation templates and architecture for AWS Control Tower☆29Updated 2 years ago
- A small lambda script that will disable access keys older than a given amount of days.☆154Updated 2 years ago
- An AWS config rule that uses IAM Access Advisor to find over-permissioned IAM users, groups, and roles.☆17Updated 5 years ago
- SSH-Restricted deploys an SSH compliance rule (AWS Config) with auto-remediation via AWS Lambda if SSH access is public.☆30Updated 4 years ago
- Lambda job in Python to automatically patch EC2 instances when an inspector assessment generates a CVE finding☆59Updated 7 years ago
- Cloudformation Template and Lambda to detect if Instance Profile credentials are being used outside your AWS Account.☆29Updated 5 years ago
- Example container image re-scan with Amazon ECR☆50Updated 3 years ago