welldone-cloud / aws-summarize-account-activityLinks
Analyzes CloudTrail data of a given AWS account and generates a summary of recently active IAM principals, API calls they made, as well as regions, IP addresses and user agents they used.
☆163Updated 3 months ago
Alternatives and similar repositories for aws-summarize-account-activity
Users that are interested in aws-summarize-account-activity are comparing it to the libraries listed below
Sorting:
- Runs IAM policy linting and security checks against either a single AWS account or a set of member accounts of an AWS Organization.☆145Updated 2 weeks ago
- KYE: Know Your Enemies - Check external access on your AWS account☆121Updated 2 months ago
- Crowdsourced list of sensitive IAM Actions☆151Updated 8 months ago
- ☆117Updated last month
- Uses the AWS Cloud Control API to list resources that are present in a given AWS account and region(s). Discovered resources are written …☆175Updated 2 months ago
- Collection of example Service Control Policies (SCPs) that are useful for sandbox and training AWS accounts.☆151Updated 2 weeks ago
- Safer AWS SCP deployments via real-time monitoring☆53Updated last year
- SCP management tool☆132Updated last year
- Example AWS Resource control policies to get started or mature your usage of AWS RCPs.☆187Updated 3 months ago
- A cloud security tool to search and clean up unused AWS access keys, written in Go.☆51Updated 2 years ago
- A collection of documented and undocumented AWS API models☆36Updated 8 months ago
- AWS SSO Reporter☆54Updated 2 months ago
- AWS honey token manager☆87Updated 11 months ago
- TODO: Funny pun about visibility☆205Updated this week
- Assisted Log Enabler for AWS - Find AWS resources that are not logging, and turn them on.☆257Updated this week
- Open-source best practices for protecting a secure, sensible cloud platform☆126Updated 8 months ago
- Example AWS Service control policies to get started or mature your usage of AWS SCPs.☆247Updated this week
- An IAM Simulator that outputs detailed explains of how a request was evaluated.☆88Updated last week
- Example policies demonstrating how to implement a data perimeter on AWS.☆172Updated this week
- Quickly query the AWS IP Ranges☆83Updated this week
- An AWS IAM policy statement parser and query tool.☆189Updated 2 weeks ago
- Enhance the security of your web applications effortlessly with AWS Firewall Factory. Safeguard your valuable assets through seamless WAF…☆254Updated 2 months ago
- A Terraform module that makes it a snap to opt out of all AWS AI/ML data harvesting.☆30Updated last year
- List of known AWS accounts☆215Updated last week
- Kickstart and manage your AWS Organization via Terraform☆103Updated last month
- This Terraform module consists of the configuration for automating the remediation of AWS EC2 vulnerabilities using AWS Inspector finding…☆48Updated last week
- Lambda function that streamlines containment of an AWS account compromise☆345Updated last year
- Access Undenied parses AWS AccessDenied CloudTrail events, explains the reasons for them, and offers actionable remediation steps. Open-s…☆264Updated 2 years ago
- Is your AWS perimeter secure? Use Powerpipe and Steampipe to check your AWS accounts for public resources, resources shared with untrust…☆111Updated this week
- ☆133Updated 3 weeks ago