zoph-io / kye
KYE: Know Your Enemies - Check external access on your AWS account
☆24Updated this week
Alternatives and similar repositories for kye:
Users that are interested in kye are comparing it to the libraries listed below
- Crowdsourced list of sensitive IAM Actions☆144Updated 5 months ago
- To clean up your AWS AMIs: First, include AMIs by name or tag. Second, exclude AMIs in use, younger than N days, or the newest N images. …☆33Updated last week
- Safer AWS SCP deployments via real-time monitoring☆51Updated last year
- Expand IAM Actions with Wildcards☆29Updated last week
- Runs IAM policy linting and security checks against either a single AWS account or a set of member accounts of an AWS Organization.☆142Updated last month
- Finders Keypers: AWS KMS Encryption Key Usage and Blast Radius Finder☆33Updated 5 months ago
- A cloud security tool to search and clean up unused AWS access keys, written in Go.☆49Updated 2 years ago
- ☆30Updated 3 weeks ago
- Scripts to quickly fix security and compliance issues☆26Updated last year
- SCP management tool☆131Updated last year
- Publicly-listed AWS account IDs for easy lookup. Great for cleaning up false positives from unknown Account IDs in Cloudtrail☆38Updated 11 months ago
- AWS honey token manager☆87Updated 8 months ago
- This solutions facilitates rapid deployment of Prowler, full AWS Organization analysis, and finding processing as part of a security post…☆56Updated 4 months ago
- Analyzes CloudTrail data of a given AWS account and generates a summary of recently active IAM principals, API calls they made, as well a…☆161Updated 2 weeks ago
- AWS SSO Reporter☆54Updated last year
- This Terraform module consists of the configuration for automating the remediation of AWS EC2 vulnerabilities using AWS Inspector finding…☆46Updated 3 months ago
- ☆32Updated 9 months ago
- Collection of example Service Control Policies (SCPs) that are useful for sandbox and training AWS accounts.☆148Updated 4 months ago
- Generates runbooks for GuardDuty findings☆35Updated 10 months ago
- ☆39Updated 3 years ago
- ☆22Updated 2 years ago
- ☆21Updated 2 years ago
- ☆87Updated last year
- Example policies demonstrating how to implement a data perimeter on AWS.☆154Updated 2 weeks ago
- ☆41Updated last year
- CloudSplaining on AWS Managed Policies☆41Updated this week
- ☆41Updated last year
- A collection of documented and undocumented AWS API models☆33Updated 5 months ago
- Implements OPA-based preventive security controls for AWS Infrastructure using Terraform Infrastructure as Code (IaC), that can establish…☆40Updated last year
- ☆20Updated 2 years ago