tenable / access-undenied-awsLinks
Access Undenied parses AWS AccessDenied CloudTrail events, explains the reasons for them, and offers actionable remediation steps. Open-sourced by Ermetic.
☆265Updated 2 years ago
Alternatives and similar repositories for access-undenied-aws
Users that are interested in access-undenied-aws are comparing it to the libraries listed below
Sorting:
- Repository for iamfast questions and issues☆175Updated 9 months ago
- Automatically compile an AWS Service Control Policy that ONLY allows AWS services that are compliant with your preferred compliance frame…☆223Updated 2 years ago
- Collection of example Service Control Policies (SCPs) that are useful for sandbox and training AWS accounts.☆159Updated 2 weeks ago
- AWS Organizations Service Control Policies (SCPs) written in HashiCorp Terraform.☆244Updated last year
- SCP management tool☆135Updated 2 years ago
- Create a break glass role for emergency use in order to limit AWS production account access. Configure automatic alerts and logging of ac…☆180Updated 2 years ago
- A crowdsourced AWS IAM permissions reference.☆102Updated 4 months ago
- A project to collate IAM actions, AWS APIs and managed policies from various public sources.☆299Updated last month
- Automate permissions to your cloud and critical applications.☆241Updated last year
- Assisted Log Enabler for AWS - Find AWS resources that are not logging, and turn them on.☆268Updated this week
- Kickstart and manage your AWS Organization via Terraform☆114Updated 2 weeks ago
- Identity & Access Management simplified and secure.☆259Updated 2 years ago
- Runs IAM policy linting and security checks against either a single AWS account or multiple member accounts of an AWS Organization.☆151Updated 2 weeks ago
- A command line tool that validates AWS IAM Policies in a Terraform template against AWS IAM best practices☆340Updated 7 months ago
- Scripts to quickly fix security and compliance issues☆106Updated 2 years ago
- Monitor AWS Managed IAM Policies Changes☆492Updated this week
- Crowdsourced list of sensitive IAM Actions☆158Updated last year
- A consolidated series of structured data for cloud identity and access management systems, including datasets for AWS, Azure, and Google …☆297Updated this week
- Collection of semi-useful Service Control Policies and scripts to manage them☆101Updated 11 months ago
- ☆93Updated last month
- No need for IAM users when we have Yubikeys☆158Updated 3 years ago
- Example policies demonstrating how to implement a data perimeter on AWS.☆190Updated this week
- Get notified when actions are taken in the AWS Console.☆328Updated 11 months ago
- Bare minimum AWS Security Alerting and Secure by default Configuration☆510Updated 7 months ago
- Enhance the security of your web applications effortlessly with AWS Firewall Factory. Safeguard your valuable assets through seamless WAF…☆255Updated last month
- CloudFormation template to create reasonable account defaults around Cost Surprise Alerting☆173Updated last year
- A collection of documented and undocumented AWS API models☆52Updated last month
- Safer AWS SCP deployments via real-time monitoring☆56Updated 2 years ago
- A cloud security tool to search and clean up unused AWS access keys, written in Go.☆51Updated 3 years ago
- AWS SSO Reporter☆55Updated 8 months ago