An AWS config rule that uses IAM Access Advisor to find over-permissioned IAM users, groups, and roles.
☆17Oct 21, 2019Updated 6 years ago
Alternatives and similar repositories for config-excess-access-exorcism
Users that are interested in config-excess-access-exorcism are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Cloudformation Template and Lambda to detect if Instance Profile credentials are being used outside your AWS Account.☆29Aug 18, 2019Updated 6 years ago
- list of useful iOS apps for developers☆10Aug 11, 2017Updated 8 years ago
- [WORK IN PROGRESS] A repo containing rule sets for cloud-custodian inside GSA AWS accounts. This repo does not contain cloud-custodian it…☆30Dec 4, 2017Updated 8 years ago
- A serverless application for processing AWS GuardDuty findings.☆11Sep 7, 2018Updated 7 years ago
- A small lambda script that will disable access keys older than a given amount of days.☆153Mar 6, 2023Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Testing for the Cloud☆19Jan 12, 2020Updated 6 years ago
- Diffs for structured data☆16Dec 26, 2018Updated 7 years ago
- A Griddle wrapper for obtaining external data with a callback.☆10Nov 22, 2015Updated 10 years ago
- Base infrastructure for future DevSecOps environment in AWS☆25Oct 21, 2020Updated 5 years ago
- Cloudtrail Log Analytics using Amazon Elasticsearch Service - AWS Serverless Application☆31Apr 21, 2023Updated 3 years ago
- Building an Egress proxy solution using Transit Gateway☆16May 22, 2019Updated 6 years ago
- ☆12May 8, 2018Updated 8 years ago
- AWS IAM resources search tool☆23May 5, 2021Updated 5 years ago
- An example Cloudformation template for the creation of an EKS compatible OpenID Connect provider☆14Jul 6, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Open source application to instantly remediate common security issues through the use of AWS Config☆219Sep 3, 2020Updated 5 years ago
- AWS managed IAM policies☆130Dec 6, 2021Updated 4 years ago
- Transform AWS Config snapshots to a more AWS Athena-friendly format.☆11Aug 26, 2020Updated 5 years ago
- Cloudwatch Logs Transform for Firehose: formats into Splunk HEC Event☆18Apr 5, 2024Updated 2 years ago
- 🔴 DevOps Interview Questions and Answered to prepare for your next DevOps developer interview from ☕FullStack.Cafe☆15Jan 24, 2020Updated 6 years ago
- This solution demonstrates how to access over SSH an EC2 instance having no SSH key installed on it, no ports open, even no public IP add…☆18Oct 31, 2019Updated 6 years ago
- [UNMAINTAINED] AWS Reader☆16May 11, 2020Updated 5 years ago
- Proof of concept incident response demo using SSM and AWS Fargate.☆14Dec 5, 2019Updated 6 years ago
- AWS managed IAM policies☆16Mar 24, 2022Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A small set of scripts to summarize AWS Security Groups, and generate visualizations of the rules.☆63Jun 12, 2020Updated 5 years ago
- A little demo of NLog logging to ELK using structured (JSON) log messages☆16Feb 4, 2018Updated 8 years ago
- Examples of AWS CloudFormation templates☆18Nov 12, 2020Updated 5 years ago
- Scans your AWS cloud resources and generates reports. Check out free hosted version:☆280Dec 12, 2020Updated 5 years ago
- Audit IAM roles and users using Access Advisor data using Python/boto3 SDK and automatically create IAM permissions boundaries to limit a…☆39Sep 8, 2020Updated 5 years ago
- Pre-configured response & remediation playbooks for AWS Security Hub☆65Nov 13, 2021Updated 4 years ago
- Demonstrates sending AWS SecurityHub findings to your email☆14Dec 14, 2018Updated 7 years ago
- A combined list of helpful awscli commands from Scott Piper's flaws.cloud exercise as well as from Beau Bullock's Breaching the Cloud Tra…☆19Mar 1, 2021Updated 5 years ago
- A lambda function to push GuardDuty Findings to SNS Topic 🎓☆18Apr 7, 2021Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- QL Workshop☆16Sep 30, 2019Updated 6 years ago
- Simple DLP monitor for AWS S3 is a tool built on top of CloudWatch events and Lambda functions to alert you when data is transferred to S…☆18Mar 4, 2020Updated 6 years ago
- Pivot into private VPC networks using a VPN connection☆43Oct 8, 2019Updated 6 years ago
- ARCHIVED - Subsystem for WildFly as that can send metrics to a RHQ Metrics server☆13Jun 16, 2016Updated 9 years ago
- Prevents you from committing secrets and credentials into git repositories☆21Jun 27, 2017Updated 8 years ago
- Code samples related to "Reduce Time to Resolution with Amazon CloudWatch Snapshot Graphs and Alerts” blog post published on the AWS DevO…☆14May 12, 2021Updated 4 years ago
- generate AWS creds for many accounts with a single MFA token☆32Oct 22, 2020Updated 5 years ago