welldone-cloud / aws-scps-for-sandbox-and-training-accountsLinks
Collection of example Service Control Policies (SCPs) that are useful for sandbox and training AWS accounts.
☆153Updated last month
Alternatives and similar repositories for aws-scps-for-sandbox-and-training-accounts
Users that are interested in aws-scps-for-sandbox-and-training-accounts are comparing it to the libraries listed below
Sorting:
- Runs IAM policy linting and security checks against either a single AWS account or multiple member accounts of an AWS Organization.☆146Updated last week
- Example policies demonstrating how to implement a data perimeter on AWS.☆176Updated this week
- SCP management tool☆132Updated last year
- Crowdsourced list of sensitive IAM Actions☆153Updated 9 months ago
- Access Undenied parses AWS AccessDenied CloudTrail events, explains the reasons for them, and offers actionable remediation steps. Open-s…☆264Updated 2 years ago
- Repository for iamfast questions and issues☆174Updated 4 months ago
- ☆90Updated 3 months ago
- Uses the AWS Cloud Control API to list resources that are present in a given AWS account and region(s). Discovered resources are written …☆176Updated 3 months ago
- Example AWS Service control policies to get started or mature your usage of AWS SCPs.☆250Updated last month
- Kickstart and manage your AWS Organization via Terraform☆103Updated 2 months ago
- Create a break glass role for emergency use in order to limit AWS production account access. Configure automatic alerts and logging of ac…☆178Updated last year
- Collection of semi-useful Service Control Policies and scripts to manage them☆99Updated 6 months ago
- Example AWS Resource control policies to get started or mature your usage of AWS RCPs.☆188Updated 4 months ago
- Analyzes CloudTrail data of a given AWS account and generates a summary of recently active IAM principals, API calls they made, as well a…☆164Updated 4 months ago
- A command line tool that validates AWS IAM Policies in a Terraform template against AWS IAM best practices☆340Updated 2 months ago
- This repository contains a sample IAM permissions boundary as a starting point for creating your own permissions boundary to meet the s…☆83Updated 6 months ago
- A consolidated series of structured data for cloud identity and access management systems, including datasets for AWS, Azure, and Google …☆280Updated this week
- Safer AWS SCP deployments via real-time monitoring☆55Updated last year
- A crowdsourced AWS IAM permissions reference.☆98Updated last week
- CloudFormation template to create reasonable account defaults around Cost Surprise Alerting☆172Updated 8 months ago
- Terraform module for serverless certificate authority on AWS☆149Updated last week
- Assisted Log Enabler for AWS - Find AWS resources that are not logging, and turn them on.☆262Updated this week
- Enhance the security of your web applications effortlessly with AWS Firewall Factory. Safeguard your valuable assets through seamless WAF…☆254Updated 2 weeks ago
- A collection of documented and undocumented AWS API models☆37Updated 9 months ago
- Automatically compile an AWS Service Control Policy that ONLY allows AWS services that are compliant with your preferred compliance frame…☆225Updated 2 years ago
- A cloud security tool to search and clean up unused AWS access keys, written in Go.☆51Updated 2 years ago
- AWS IAM Permissions Guardrails https://aws-samples.github.io/aws-iam-permissions-guardrails/☆124Updated 2 years ago
- AWS VPC Subnets Watcher☆77Updated last year
- Publicly-listed AWS account IDs for easy lookup. Great for cleaning up false positives from unknown Account IDs in Cloudtrail☆39Updated last year
- This solution supports a bidirectional integration between Security Hub and JIRA. Issues can be either created automatically or manually …☆41Updated last year