turbot / steampipe-mod-aws-tagsLinks
Is your AWS tagging strategy following best practice? This mod checks if your AWS resource tags are set correctly to help you manage them effectively using Powerpipe and Steampipe.
☆19Updated 2 months ago
Alternatives and similar repositories for steampipe-mod-aws-tags
Users that are interested in steampipe-mod-aws-tags are comparing it to the libraries listed below
Sorting:
- Are AWS Well-Architected best practices being followed? Use Powerpipe and Steampipe to check if your AWS accounts are following best prac…☆16Updated 8 months ago
- Examples, samples, snippets and scripts to use with Steampipe.☆52Updated 11 months ago
- Run compliance and security controls to detect Terraform AWS resources deviating from security best practices prior to deployment using P…☆27Updated 8 months ago
- SSH-Restricted deploys an SSH compliance rule (AWS Config) with auto-remediation via AWS Lambda if SSH access is public.☆30Updated 4 years ago
- Labs helping you to learn how write IAM policies following the least privilege principle.☆21Updated last year
- Terraform module for Policy Sentry.☆25Updated 4 years ago
- A terraform module to install the prerequisites for cloud-custodian☆10Updated last year
- Terraform module to provision Service Control Policies (SCP) for AWS Organizations, Organizational Units, and AWS accounts☆52Updated last month
- This repository contains the full dataset of AWS IAM data (services, actions, resource types and conditions keys). It's updated on a dail…☆62Updated last week
- Provides teams using Turbot Guardrails automation and configuration-as-code examples for effective management of Guardrails for their org…☆25Updated this week
- ☆21Updated 2 years ago
- View dashboards and reports across all of your AWS accounts using Powerpipe and Steampipe.☆97Updated 3 weeks ago
- Use SQL to instantly query Oracle Cloud resources across regions and accounts. Open source CLI. No DB required.☆19Updated this week
- ⚡ OpenSSH + AWS SSM + EC2 Instance Connect + sshuttle.☆18Updated 2 years ago
- Some of my tools and sample code for building with AWS.☆34Updated 3 weeks ago
- EC2 instance running Former2 for generating IaC scripts from existing AWS resources with temporary security credentials☆28Updated 2 months ago
- CloudCustodian Rules engine for cloud security and governance, DSL in yaml for policies to query, filter, and take actions on resources☆20Updated last year
- Creates and configures AWS CloudTrail☆46Updated 5 months ago
- Github action for linting AWS IAM policy documents☆38Updated 2 years ago
- Use Cloud Control API to remediate drift that was detected on a CloudFormation stack☆1Updated last year
- Automatically close AWS Accounts when moved to a specific Organizational Unit, such as SuspendedOU or ToBeDeletedOU or BlackHole 😛☆14Updated 3 years ago
- Terraform Module to provision a basic IAM user suitable for humans.☆72Updated 2 weeks ago
- ☆23Updated 2 years ago
- Combines AWS Organizations Service Control Policies (SCP)☆55Updated 5 months ago
- This module configures AWS Config, a service that enables you to assess, audit, and evaluate the configurations of your AWS resources.☆48Updated last month
- Module for enabling and configuring common baseline services such as SecurityHub • This repository is defined and managed in Terraform☆21Updated this week
- Validate all your Customer IAM Policies against AWS Access Analyzer - Policy Validation☆43Updated 4 years ago
- Terraform support for AWS DevOps Guru☆22Updated last year
- Command line to list and IP whitelist active AWS credentials☆15Updated 3 years ago
- This repository shows how to setup Centralized CloudWatch Observability Manager using Terraform☆17Updated 7 months ago