turbot / steampipe-mod-aws-thrifty
Are you a Thrifty AWS dev? This mod checks your AWS accounts for unused and under-utilized resources using Powerpipe and Steampipe.
☆98Updated 3 weeks ago
Related projects ⓘ
Alternatives and complementary repositories for steampipe-mod-aws-thrifty
- AWS IAM policy generation from application code☆170Updated 10 months ago
- Use SQL to instantly query AWS resources across regions and accounts. Open source CLI. No DB required.☆191Updated this week
- View dashboards and reports across all of your AWS accounts using Powerpipe and Steampipe.☆89Updated last month
- Terraform module for serverless certificate authority on AWS☆105Updated this week
- AWS VPC Subnets Watcher☆73Updated last year
- bash functions to help run aws-cli commands across roles in multiple accounts with MFA☆68Updated 4 years ago
- A command-line tool which can move CloudFormation resources between stacks☆88Updated this week
- ☆85Updated 11 months ago
- Allow users to request temporary elevated access to your AWS environment☆120Updated last year
- Create a break glass role for emergency use in order to limit AWS production account access. Configure automatic alerts and logging of ac…☆171Updated last year
- Get notified when actions are taken in the AWS Console.☆253Updated 2 weeks ago
- Access Undenied parses AWS AccessDenied CloudTrail events, explains the reasons for them, and offers actionable remediation steps. Open-s…☆261Updated last year
- ☆15Updated last year
- ☆117Updated this week
- IAM policy actions autocomplete, documentation & wildcard resolution for VS Code☆152Updated this week
- AWS bulk tagging tool☆153Updated 2 weeks ago
- Builds a tree view of parameters from AWS System Manager Parameter Store☆69Updated 9 months ago
- Combines AWS Organizations Service Control Policies (SCP)☆52Updated 7 months ago
- ☆140Updated 5 months ago
- Convert secrets stored in AWS Secrets Manager to environment variables☆47Updated last year
- CloudFormation template to create reasonable account defaults around Cost Surprise Alerting☆166Updated 2 months ago
- Parse AWS CloudTrail events and send alerts to Slack for events that match pre-configured rules☆94Updated last week
- A tool to show what AWS account and identity you're using.☆93Updated last year
- AWS IAM Permissions Guardrails https://aws-samples.github.io/aws-iam-permissions-guardrails/☆122Updated last year
- Get alerts when people are using the AWS console to modify create or modify resources.☆88Updated 2 years ago
- ☆135Updated 6 months ago
- SCP management tool☆126Updated last year
- Export / Import your AWS Organizational Structure and Policies - Attach & Validate your SCPs☆26Updated last year
- Retrospectively tag AWS resources so you can work out who created them☆110Updated 11 months ago
- This module configures AWS Config, a service that enables you to assess, audit, and evaluate the configurations of your AWS resources.☆46Updated this week