zoph-io / kye
KYE: Know Your Enemies - Check external access on your AWS account
☆109Updated 3 weeks ago
Alternatives and similar repositories for kye
Users that are interested in kye are comparing it to the libraries listed below
Sorting:
- Analyzes CloudTrail data of a given AWS account and generates a summary of recently active IAM principals, API calls they made, as well a…☆161Updated last month
- Runs IAM policy linting and security checks against either a single AWS account or a set of member accounts of an AWS Organization.☆143Updated 2 months ago
- Crowdsourced list of sensitive IAM Actions☆145Updated 6 months ago
- AWS honey token manager☆87Updated 9 months ago
- Safer AWS SCP deployments via real-time monitoring☆51Updated last year
- Quickly query the AWS IP Ranges☆83Updated this week
- Finders Keypers: AWS KMS Encryption Key Usage and Blast Radius Finder☆35Updated this week
- An IAM Simulator that outputs detailed explains of how a request was evaluated.☆77Updated this week
- Example AWS Resource control policies to get started or mature your usage of AWS RCPs.☆179Updated last month
- Collection of example Service Control Policies (SCPs) that are useful for sandbox and training AWS accounts.☆148Updated 5 months ago
- SCP management tool☆131Updated last year
- This Terraform module consists of the configuration for automating the remediation of AWS EC2 vulnerabilities using AWS Inspector finding…☆46Updated 3 months ago
- AWS SSO Reporter☆54Updated last week
- A cloud security tool to search and clean up unused AWS access keys, written in Go.☆49Updated 2 years ago
- Uses the AWS Cloud Control API to list resources that are present in a given AWS account and region(s). Discovered resources are written …☆174Updated last week
- A collection of documented and undocumented AWS API models☆34Updated 6 months ago
- A tool to uncover undocumented APIs from the AWS Console.☆102Updated 2 weeks ago
- Example policies demonstrating how to implement a data perimeter on AWS.☆156Updated 3 weeks ago
- ☆117Updated last month
- ☆88Updated last year
- This solutions facilitates rapid deployment of Prowler, full AWS Organization analysis, and finding processing as part of a security post…☆57Updated 5 months ago
- Generates runbooks for GuardDuty findings☆35Updated 10 months ago
- An AWS IAM policy statement parser and query tool.☆179Updated last year
- A Terraform module that makes it a snap to opt out of all AWS AI/ML data harvesting.☆30Updated last year
- To clean up your AWS AMIs: First, include AMIs by name or tag. Second, exclude AMIs in use, younger than N days, or the newest N images. …☆34Updated last month
- Example AWS Service control policies to get started or mature your usage of AWS SCPs.☆241Updated 2 months ago
- A multi-vault secret injection tool for safely injecting secrets into app environment☆124Updated 3 weeks ago
- Test & Compare different Kubernetes security offerings on EKS, GKE and AKS☆39Updated 8 months ago
- ☆30Updated last month
- Open-source best practices for protecting a secure, sensible cloud platform☆125Updated 6 months ago