trek10inc / config-excess-access-exorcismLinks
An AWS config rule that uses IAM Access Advisor to find over-permissioned IAM users, groups, and roles.
☆17Updated 5 years ago
Alternatives and similar repositories for config-excess-access-exorcism
Users that are interested in config-excess-access-exorcism are comparing it to the libraries listed below
Sorting:
- Some of my personal rules for CapitalOne's Cloud Custodian project☆45Updated 4 years ago
- Lambda job in Python to automatically patch EC2 instances when an inspector assessment generates a CVE finding☆59Updated 6 years ago
- A collection of useful queries that can be used to verify compliance/security across your AWS assets☆31Updated 5 years ago
- [WORK IN PROGRESS] A repo containing rule sets for cloud-custodian inside GSA AWS accounts. This repo does not contain cloud-custodian it…☆30Updated 7 years ago
- Automate the AWS GuardDuty account invitation lifecycle for all of your organizations AWS accounts in all regions as well as aggregate an…☆67Updated 2 years ago
- This CloudWatch Events rule Lambda function evaluates AWS API calls that change Amazon EC2 security group ingress rules. The function fla…☆25Updated 5 years ago
- Workshop exercise materials for re:Invent 2017 - SID 341: Using AWS CloudTrail Logs for Scalable, Automated Anomaly Detection☆52Updated 6 years ago
- Audit IAM roles and users using Access Advisor data using Python/boto3 SDK and automatically create IAM permissions boundaries to limit a…☆37Updated 4 years ago
- Python scripts to run in AWS Lambda to process findings from Amazon Inspector☆39Updated 6 years ago
- Glue workflow to convert CloudTrail logs to Athena-friendly Parquet format☆48Updated last year
- This command line tool counts the number of resources in different categories across Amazon regions.☆59Updated 5 years ago
- Pre-configured response & remediation playbooks for AWS Security Hub☆65Updated 3 years ago
- Demonstrates sending AWS findings to your Slack Channel☆60Updated last year
- Cloudformation Template and Lambda to detect if Instance Profile credentials are being used outside your AWS Account.☆29Updated 5 years ago
- Cloud Custodian Policies for Automated Amazon Resource Management☆59Updated 5 years ago
- AWS Landing Zone Template☆40Updated 4 years ago
- A curated list of things relating to CapitalOne's Cloud-custodian project☆90Updated 5 years ago
- Lambda job in Python to automatically deploy Inspector agent to newly-launched EC2 instances☆29Updated 6 years ago
- Public tables and other research that can accept PRs. Please visit the web link.☆44Updated 5 years ago
- ☆29Updated 6 months ago
- Cloud Custodian Policy Files and code☆68Updated 2 years ago
- Manheim's Cloud Custodian (c7n) wrapper package, policy generator, runner, and supporting tools.☆45Updated 3 months ago
- Automate the daily partitioning of your CloudTrail bucket in Athena☆28Updated last year
- This is a collection of AWS CloudFormation templates which create Lambda functions triggered by CloudWatch Events rule to evaluate AWS AP…☆52Updated 6 years ago
- A small lambda script that will disable access keys older than a given amount of days.☆154Updated 2 years ago
- Tools to help automate your AWS Accounts☆100Updated 9 months ago
- Show the history and changes between configuration versions of AWS resources☆70Updated 6 years ago
- This script automates the process of running the GuardDuty multi-account workflow across a group of accounts that are in your control☆131Updated 8 months ago
- Lambda Extension for iamlive☆41Updated 4 years ago
- The open source version of the AWS CloudTrail User Guide. You can submit feedback & requests for changes by submitting issues in this rep…☆42Updated last year