yanilov / control-tagsLinks
Scalable integrity framework for ABAC on AWS
☆54Updated 2 months ago
Alternatives and similar repositories for control-tags
Users that are interested in control-tags are comparing it to the libraries listed below
Sorting:
- Crowdsourced list of sensitive IAM Actions☆146Updated 7 months ago
- An IAM Simulator that outputs detailed explains of how a request was evaluated.☆78Updated this week
- AWS SSO Reporter☆54Updated 3 weeks ago
- KYE: Know Your Enemies - Check external access on your AWS account☆117Updated last month
- Attaché provides an emulation layer for Cloud Provider IMDS APIs☆55Updated 11 months ago
- Safer AWS SCP deployments via real-time monitoring☆53Updated last year
- Finders Keypers: AWS KMS Encryption Key Usage and Blast Radius Finder☆35Updated 2 weeks ago
- A Golang program to rotate AWS & GCP account keys☆65Updated 2 weeks ago
- AWS honey token manager☆87Updated 9 months ago
- ☆33Updated 2 years ago
- To clean up your AWS AMIs: First, include AMIs by name or tag. Second, exclude AMIs in use, younger than N days, or the newest N images. …☆34Updated last month
- ☆50Updated 4 months ago
- ☆67Updated 2 weeks ago
- This Terraform module consists of the configuration for automating the remediation of AWS EC2 vulnerabilities using AWS Inspector finding…☆46Updated 4 months ago
- ☆22Updated 2 years ago
- Runs IAM policy linting and security checks against either a single AWS account or a set of member accounts of an AWS Organization.☆144Updated 2 months ago
- TrailAlerts is a AWS-native, serverless cloud-detection tool that lets you define simple rules as code and get rich alerts about events i…☆41Updated 3 weeks ago
- A cloud security tool to search and clean up unused AWS access keys, written in Go.☆49Updated 2 years ago
- Tools that checks for misconfigured access to Github OIDC from AWS roles and GCP service accounts☆61Updated 2 years ago
- ☆117Updated this week
- Data perimeter helper is a tool that helps you design and anticipate the impact of your data perimeter controls☆16Updated 2 months ago
- Example policies demonstrating how to implement a data perimeter on AWS.☆156Updated last week
- Open-source proof-of-concept client for AWS IAM Roles Anywhere☆71Updated 2 years ago
- A tool for quickly evaluating IAM permissions in AWS.☆73Updated last year
- ☆21Updated 2 years ago
- Expand IAM Actions with Wildcards☆29Updated last week
- Collection of example Service Control Policies (SCPs) that are useful for sandbox and training AWS accounts.☆148Updated 5 months ago
- The Amazon Elastic Kubernetes Service (EKS) Creation Engine (ECE) is a Python command-line program created by the Lightspin Office of the…☆40Updated 2 years ago
- Collect IAM information from all your AWS organization, accounts, and resources.☆13Updated last week
- Quickly query the AWS IP Ranges☆83Updated this week