yanilov / control-tagsLinks
Scalable integrity framework for ABAC on AWS
☆56Updated 8 months ago
Alternatives and similar repositories for control-tags
Users that are interested in control-tags are comparing it to the libraries listed below
Sorting:
- Collect IAM information from all your AWS organization, accounts, and resources.☆80Updated last week
- An IAM Simulator that outputs detailed explains of how a request was evaluated.☆95Updated this week
- AWS SSO Reporter☆55Updated 6 months ago
- AWS honey token manager☆89Updated last year
- KYE: Know Your Enemies - Check external access on your AWS account☆127Updated 7 months ago
- Crowdsourced list of sensitive IAM Actions☆156Updated last year
- Safer AWS SCP deployments via real-time monitoring☆56Updated 2 years ago
- This Terraform module consists of the configuration for automating the remediation of AWS EC2 vulnerabilities using AWS Inspector finding…☆50Updated 4 months ago
- Attaché provides an emulation layer for Cloud Provider IMDS APIs☆60Updated last year
- Runs IAM policy linting and security checks against either a single AWS account or multiple member accounts of an AWS Organization.☆151Updated 3 months ago
- Google Maps for AWS IAM☆253Updated last week
- ☆123Updated 6 months ago
- Analyzes CloudTrail data of a given AWS account and generates a summary of recently active IAM principals, API calls they made, as well a…☆165Updated 7 months ago
- ☆35Updated 2 years ago
- A collection of documented and undocumented AWS API models☆51Updated last week
- ☆28Updated 2 weeks ago
- Tools that checks for misconfigured access to Github OIDC from AWS roles and GCP service accounts☆61Updated 2 years ago
- TrailAlerts is a AWS-native, serverless cloud-detection tool that lets you define simple rules as code and get rich alerts about events i…☆51Updated 3 weeks ago
- Data perimeter helper is a tool that helps you design and anticipate the impact of your data perimeter controls☆18Updated 8 months ago
- Generates runbooks for GuardDuty findings☆39Updated last year
- ☆23Updated 2 years ago
- ☆74Updated last month
- To clean up your AWS AMIs: First, include AMIs by name or tag. Second, exclude AMIs in use, younger than N days, or the newest N images. …☆36Updated 3 months ago
- A cloud security tool to search and clean up unused AWS access keys, written in Go.☆51Updated 3 years ago
- ☆49Updated 2 years ago
- Compares and analyzes GCP IAM roles.☆77Updated 8 months ago
- ☆47Updated last year
- Open-source best practices for protecting a secure, sensible cloud platform☆128Updated last year
- A Golang program to rotate AWS & GCP account keys☆65Updated 6 months ago
- Common Golang Packages for use by the Various Cloud Nuke Tools☆51Updated last week