zoph-io / aws-internal-static-web-hostingLinks
Host Internal Static Website on AWS
☆17Updated last year
Alternatives and similar repositories for aws-internal-static-web-hosting
Users that are interested in aws-internal-static-web-hosting are comparing it to the libraries listed below
Sorting:
- Collect IAM information from all your AWS organization, accounts, and resources.☆28Updated last week
- ☆33Updated 2 years ago
- ☆21Updated 2 years ago
- ☆32Updated 11 months ago
- Safer AWS SCP deployments via real-time monitoring☆53Updated last year
- To clean up your AWS AMIs: First, include AMIs by name or tag. Second, exclude AMIs in use, younger than N days, or the newest N images. …☆34Updated last week
- ☆36Updated last year
- Expand IAM Actions with Wildcards☆31Updated this week
- ☆31Updated 2 months ago
- Data perimeter helper is a tool that helps you design and anticipate the impact of your data perimeter controls☆16Updated 3 months ago
- Centralizing AWS CloudWatch log forwarding via EventBridge and Step Functions☆49Updated 2 years ago
- Scripts to quickly fix security and compliance issues☆27Updated last year
- Private Software-As-A-Service (SaaS) connectivity with AWS Privatelink☆24Updated last year
- ☆22Updated 2 years ago
- A cloud security tool to search and clean up unused AWS access keys, written in Go.☆50Updated 2 years ago
- AWS SSO Reporter☆54Updated last month
- ☆39Updated 3 years ago
- ☆20Updated 2 years ago
- Stop EC2 instances and RDS/Aurora databases overnight by tagging them with cron schedules, to cut AWS costs. Trigger CloudFormation stack…☆63Updated last week
- Useful scripts for maintaining multiple AWS Accounts☆45Updated 3 months ago
- Finders Keypers: AWS KMS Encryption Key Usage and Blast Radius Finder☆41Updated last month
- ☆41Updated last year
- Automated AWS account hardening with AWS Control Tower and AWS Step Functions☆37Updated 3 months ago
- Minimum DevSecOps with Monitoring Options on Amazon EKS☆12Updated 2 months ago
- ☆10Updated 9 months ago
- This solutions facilitates rapid deployment of Prowler, full AWS Organization analysis, and finding processing as part of a security post…☆59Updated 3 weeks ago
- Crowdsourced list of sensitive IAM Actions☆151Updated 8 months ago
- Solution to setup a recurring Security Hub CSV full report with email notification to provide detailed report of the security posture.☆21Updated 3 months ago
- This Terraform module consists of the configuration for automating the remediation of AWS EC2 vulnerabilities using AWS Inspector finding…☆48Updated 5 months ago
- AWS honey token manager☆87Updated 11 months ago