trek10inc / config-excess-access-exorcism
An AWS config rule that uses IAM Access Advisor to find over-permissioned IAM users, groups, and roles.
☆16Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for config-excess-access-exorcism
- Demonstrates sending AWS findings to your Slack Channel☆56Updated last year
- Cloud Custodian Policies for Automated Amazon Resource Management☆59Updated 5 years ago
- Audit IAM roles and users using Access Advisor data using Python/boto3 SDK and automatically create IAM permissions boundaries to limit a…☆37Updated 4 years ago
- [WORK IN PROGRESS] A repo containing rule sets for cloud-custodian inside GSA AWS accounts. This repo does not contain cloud-custodian it…☆29Updated 6 years ago
- Lambda job in Python to automatically patch EC2 instances when an inspector assessment generates a CVE finding☆58Updated 6 years ago
- This CloudWatch Events rule Lambda function evaluates AWS API calls that change Amazon EC2 security group ingress rules. The function fla…☆25Updated 4 years ago
- Lab materials and documentation for the workshop ARC325 Managing Multiple Accounts at Scale at re:Invent 2017☆78Updated 4 years ago
- Some of my personal rules for CapitalOne's Cloud Custodian project☆43Updated 3 years ago
- Shell script that automates the copy of encrypted AMI across accounts and regions.☆56Updated last year
- AWS Landing Zone Template☆39Updated 3 years ago
- This script automates the process of running the GuardDuty multi-account workflow across a group of accounts that are in your control☆130Updated 2 months ago
- ☆57Updated 11 months ago
- Deep Security's APIs make it simple to integration with a variety of AWS Services☆28Updated 5 years ago
- A curated list of things relating to CapitalOne's Cloud-custodian project☆88Updated 4 years ago
- Cloud Custodian Policy Files and code☆67Updated last year
- Workshop on how to implement automated remediations of findings submitted to AWS Security Hub leveraging an open source tool named Cloud …☆21Updated 3 years ago
- Workshop exercise materials for re:Invent 2017 - SID 341: Using AWS CloudTrail Logs for Scalable, Automated Anomaly Detection☆51Updated 5 years ago
- Automate the AWS GuardDuty account invitation lifecycle for all of your organizations AWS accounts in all regions as well as aggregate an…☆66Updated last year
- Python scripts to run in AWS Lambda to process findings from Amazon Inspector☆39Updated 6 years ago
- Cloud Custodian example policies that remediate security issues, enforce tagging, and control costs☆62Updated 2 years ago
- AWS Quick Start Team☆67Updated 2 years ago
- Squid Proxy + AWS Fargate☆45Updated 6 months ago
- An automated reference implementation that assists with setting up corss account roles for easy federation of users from one AWS master a…☆57Updated 6 years ago
- A CloudFormation custom resource provider for adding an IAM SAML provider.☆22Updated last week
- This repository contains Python code to import the findings from AWS Config into AWS Security Hub.☆20Updated 2 years ago
- A serverless application for processing AWS GuardDuty findings.☆11Updated 6 years ago
- Cost Optimization Monitor solution as a reference deployment which provides dashboard and reporting capabilities giving customers a singl…☆60Updated 5 years ago
- ☆25Updated this week
- Show the history and changes between configuration versions of AWS resources☆69Updated 5 years ago