welldone-cloud / aws-summarize-account-activityLinks
Analyzes CloudTrail data of a given AWS account and generates a summary of recently active IAM principals, API calls they made, as well as regions, IP addresses and user agents they used.
☆163Updated 3 months ago
Alternatives and similar repositories for aws-summarize-account-activity
Users that are interested in aws-summarize-account-activity are comparing it to the libraries listed below
Sorting:
- Runs IAM policy linting and security checks against either a single AWS account or a set of member accounts of an AWS Organization.☆146Updated this week
- KYE: Know Your Enemies - Check external access on your AWS account☆125Updated 3 months ago
- Crowdsourced list of sensitive IAM Actions☆152Updated 9 months ago
- Collection of example Service Control Policies (SCPs) that are useful for sandbox and training AWS accounts.☆153Updated last month
- TODO: Funny pun about visibility☆222Updated this week
- Safer AWS SCP deployments via real-time monitoring☆54Updated last year
- Uses the AWS Cloud Control API to list resources that are present in a given AWS account and region(s). Discovered resources are written …☆175Updated 3 months ago
- AWS SSO Reporter☆54Updated 3 months ago
- SCP management tool☆132Updated last year
- Example AWS Resource control policies to get started or mature your usage of AWS RCPs.☆187Updated 4 months ago
- A cloud security tool to search and clean up unused AWS access keys, written in Go.☆50Updated 2 years ago
- ☆117Updated 2 months ago
- Example AWS Service control policies to get started or mature your usage of AWS SCPs.☆248Updated 3 weeks ago
- AWS honey token manager☆87Updated last year
- Assisted Log Enabler for AWS - Find AWS resources that are not logging, and turn them on.☆261Updated this week
- A collection of documented and undocumented AWS API models☆37Updated 8 months ago
- List of known AWS accounts☆219Updated last week
- Kickstart and manage your AWS Organization via Terraform☆103Updated last month
- Example policies demonstrating how to implement a data perimeter on AWS.☆174Updated 3 weeks ago
- An IAM Simulator that outputs detailed explains of how a request was evaluated.☆91Updated last week
- Open-source best practices for protecting a secure, sensible cloud platform☆126Updated 9 months ago
- Enhance the security of your web applications effortlessly with AWS Firewall Factory. Safeguard your valuable assets through seamless WAF…☆254Updated this week
- An AWS IAM policy statement parser and query tool.☆192Updated last month
- Lambda function that streamlines containment of an AWS account compromise☆346Updated last year
- This Terraform module consists of the configuration for automating the remediation of AWS EC2 vulnerabilities using AWS Inspector finding…☆49Updated last month
- This solutions facilitates rapid deployment of Prowler, full AWS Organization analysis, and finding processing as part of a security post…☆60Updated 2 months ago
- Access Undenied parses AWS AccessDenied CloudTrail events, explains the reasons for them, and offers actionable remediation steps. Open-s…☆264Updated 2 years ago
- To clean up your AWS AMIs: First, include AMIs by name or tag. Second, exclude AMIs in use, younger than N days, or the newest N images. …☆34Updated this week
- Terraform module for serverless certificate authority on AWS☆148Updated last week
- A Terraform module that makes it a snap to opt out of all AWS AI/ML data harvesting.☆30Updated last year