widdix / aws-amicleanerLinks
To clean up your AWS AMIs: First, include AMIs by name or tag. Second, exclude AMIs in use, younger than N days, or the newest N images. Third, manually confirm the list of AMIs for deletion.
☆34Updated last month
Alternatives and similar repositories for aws-amicleaner
Users that are interested in aws-amicleaner are comparing it to the libraries listed below
Sorting:
- Safer AWS SCP deployments via real-time monitoring☆53Updated last year
- Finders Keypers: AWS KMS Encryption Key Usage and Blast Radius Finder☆35Updated 2 weeks ago
- Generates runbooks for GuardDuty findings☆35Updated 11 months ago
- Scripts to quickly fix security and compliance issues☆26Updated last year
- Collect IAM information from all your AWS organization, accounts, and resources.☆13Updated last week
- A cloud security tool to search and clean up unused AWS access keys, written in Go.☆49Updated 2 years ago
- ☆41Updated last year
- ☆41Updated 6 months ago
- This Terraform module consists of the configuration for automating the remediation of AWS EC2 vulnerabilities using AWS Inspector finding…☆46Updated 4 months ago
- AWS SSO Reporter☆54Updated 3 weeks ago
- ☆33Updated 2 years ago
- Crowdsourced list of sensitive IAM Actions☆146Updated 7 months ago
- KYE: Know Your Enemies - Check external access on your AWS account☆117Updated last month
- TrailAlerts is a AWS-native, serverless cloud-detection tool that lets you define simple rules as code and get rich alerts about events i…☆41Updated 3 weeks ago
- ☆21Updated 2 years ago
- Use Cloud Control API to remediate drift that was detected on a CloudFormation stack☆1Updated 11 months ago
- A toolset to juggle AWS roles for persistent access☆57Updated 9 months ago
- ☆30Updated last month
- ☆22Updated 2 years ago
- Example code for setting up CIS Benchmarks using EventBridge☆20Updated 3 years ago
- Terraform templates for CI/CD to Cloud federation and Cloud2Cloud IAM federations☆64Updated 6 months ago
- ☆39Updated 3 years ago
- Runs IAM policy linting and security checks against either a single AWS account or a set of member accounts of an AWS Organization.☆144Updated 2 months ago
- Stop EC2 instances and RDS/Aurora databases overnight by tagging them with cron schedules, to cut AWS costs. Trigger CloudFormation stack…☆60Updated this week
- Awesome AWS service control policies (SCPs), Resource Control Policies (RCPs), and other organizational policies☆27Updated last month
- CloudSplaining on AWS Managed Policies☆43Updated this week
- Listing of resources for example AWS Service Control Policies (SCPs)☆17Updated last year
- Tools that checks for misconfigured access to Github OIDC from AWS roles and GCP service accounts☆61Updated 2 years ago
- An IAM Simulator that outputs detailed explains of how a request was evaluated.☆78Updated this week
- Useful scripts for maintaining multiple AWS Accounts☆45Updated 2 months ago