suzuki-shunsuke / tfprovidercheck
CLI to prevent malicious Terraform Providers from being executed. You can define the allow list of Terraform Providers and their versions, and check if disallowed providers aren't used
☆76Updated this week
Related projects ⓘ
Alternatives and complementary repositories for tfprovidercheck
- A GitHub App that acts like a Security Token Service (STS) for the Github API☆139Updated this week
- A Golang program to rotate AWS & GCP account keys☆65Updated 2 months ago
- Kickstart and manage your AWS Organization via Terraform☆71Updated this week
- Sharable Config Presets for Renovatebot, especially useful for DevOps folks☆46Updated this week
- Create and store a hash of the Terraform modules used by your configuration☆76Updated 4 months ago
- Rego policies for enterprise-scale Compliance-as-Code with OPA Conftest.☆58Updated last year
- Kubernetes audit logging, when you don't control the control plane☆65Updated this week
- A Terraform module that makes it a snap to opt out of all AWS AI/ML data harvesting.☆30Updated 10 months ago
- Display your Terraform module call stack in your terminal☆149Updated this week
- AWS honey token manager☆84Updated 3 months ago
- Experimental: TFLint ruleset plugin for writing custom rules in Rego.☆62Updated 2 weeks ago
- A cloud security tool to search and clean up unused AWS access keys, written in Go.☆49Updated 2 years ago
- debug IAM roles for service accounts☆62Updated this week
- Safer AWS SCP deployments via real-time monitoring☆43Updated last year
- Automated refactoring for Terraform☆72Updated 2 years ago
- Cedar for Kubernetes brings the power of Cedar to Kubernetes authorization and admission validation, showing how cluster administrators c…☆80Updated this week
- A command-line tool to perform Local Health Check Probes inside Container Images (ECS, Docker)☆50Updated last week
- ☆33Updated last year
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.☆59Updated 8 months ago
- prel(iminary) is an application that temporarily assigns Google Cloud IAM Roles and includes an approval process.☆37Updated this week
- Terraform templates for CI/CD to Cloud federation and Cloud2Cloud IAM federations☆58Updated 2 weeks ago
- Is your AWS perimeter secure? Use Powerpipe and Steampipe to check your AWS accounts for public resources, resources shared with untrust…☆106Updated 3 weeks ago
- A CLI utility to sort Terraform variables and outputs☆140Updated 2 months ago
- Simple plug-and-play Github Action to block unauthorized outbound traffic (egress) in your Github workflows☆79Updated this week
- A fuzzy-finder command-line tool for removing resources from terraform state☆37Updated last year
- Add comments to pull requests where tfsec checks have failed☆164Updated last year
- Crowdsourced list of sensitive IAM Actions☆139Updated 3 weeks ago
- ☆39Updated this week
- Terraform provider and module version checking tool☆135Updated last year
- Detect terraform drift in atlantis☆70Updated last week