Generate an IAM policy from AWS, Azure, or Google Cloud (GCP) calls using client-side monitoring (CSM) or embedded proxy
-
Updated
Sep 6, 2024 - Go
Generate an IAM policy from AWS, Azure, or Google Cloud (GCP) calls using client-side monitoring (CSM) or embedded proxy
🔐💥 KeyNuker - nuke AWS keys accidentally leaked to Github
A unified IAM+Kubernetes RBAC access control exploration tool
Hallow is a SSH Certificate Authority designed for use with AWS native environments
AWS IAM Operator for Kubernetes
Cloud governance reports from native services in a clear and readable digest
Translate AWS IAM policy to Casbin policy
Expand folded policies to achieve the least privilege
Add a description, image, and links to the aws-iam topic page so that developers can more easily learn about it.
To associate your repository with the aws-iam topic, visit your repo's landing page and select "manage topics."