welldone-cloud / aws-list-resources
☆135Updated last month
Alternatives and similar repositories for aws-list-resources:
Users that are interested in aws-list-resources are comparing it to the libraries listed below
- Crowdsourced list of sensitive IAM Actions☆141Updated 3 months ago
- SCP management tool☆130Updated last year
- Example policies demonstrating how to implement a data perimeter on AWS.☆146Updated last week
- ☆134Updated 3 weeks ago
- ☆145Updated 2 months ago
- Safer AWS SCP deployments via real-time monitoring☆50Updated last year
- Example AWS Service control policies to get started or mature your usage of AWS SCPs.☆232Updated last week
- Kickstart and manage your AWS Organization via Terraform☆79Updated this week
- AWS SSO Reporter☆54Updated last year
- ☆157Updated 3 weeks ago
- This solution supports a bidirectional integration between Security Hub and JIRA. Issues can be either created automatically or manually …☆37Updated 6 months ago
- Assisted Log Enabler for AWS - Find AWS resources that are not logging, and turn them on.☆245Updated this week
- Example AWS Resource control policies to get started or mature your usage of AWS RCPs.☆93Updated last week
- A crowdsourced AWS IAM permissions reference.☆89Updated last week
- Collection of semi-useful Service Control Policies and scripts to manage them☆93Updated 2 weeks ago
- ☆112Updated last month
- ☆85Updated last year
- AWS Organizations Service Control Policies (SCPs) written in HashiCorp Terraform.☆237Updated 4 months ago
- A collection of documented and undocumented AWS API models☆32Updated 3 months ago
- A cloud security tool to search and clean up unused AWS access keys, written in Go.☆50Updated 2 years ago
- An AWS IAM policy statement parser and query tool.☆173Updated last year
- ☆125Updated 2 months ago
- The Amazon Elastic Kubernetes Service (EKS) Creation Engine (ECE) is a Python command-line program created by the Lightspin Office of the…☆40Updated 2 years ago
- Expand IAM Actions with Wildcards☆29Updated this week
- This solutions facilitates rapid deployment of Prowler, full AWS Organization analysis, and finding processing as part of a security post…☆54Updated 2 months ago
- This repository contains a sample IAM permissions boundary as a starting point for creating your own permissions boundary to meet the s…☆75Updated 6 months ago
- Enhance the security of your web applications effortlessly with AWS Firewall Factory. Safeguard your valuable assets through seamless WAF…☆241Updated this week
- Pre-configured response & remediation playbooks for AWS Security Hub☆65Updated 3 years ago
- ☆17Updated last year
- Allow users to request temporary elevated access to your AWS environment☆122Updated last year