List of open source tools for AWS security: defensive, offensive, auditing, DFIR, etc.
-
Updated
Jan 19, 2024 - Shell
List of open source tools for AWS security: defensive, offensive, auditing, DFIR, etc.
SSH over AWS SSM. No bastions or public-facing instances. SSH user management through IAM. No requirement to store SSH keys locally or on server.
Fetch AWS keys and secrets from ~/.aws/credentials using a simple bash script
Test IAM Policies in Multi Account Structures in your CI/CD pipeline
Notes, Docs, CLI Commands and, Flashcards for AWS certified solutions architect - Associate Level
An example of how Entitlements can be configured
Reverse auth proxy container for OAuth/OpenID Connect
assume-role: a CLI tool making it easy to assume IAM roles through an AWS Bastion account
The one-stop place to learn/experience the examples, use-cases, demonstrations, and resources related to microservices security patterns with Ballerina, which is an open-source programming language for the cloud that makes it easier to use, combine, and create network services.
A Buildkite plugin to assume-role-with-web-identity using a Buildkite OIDC token before running the build command
Dockerization of SailPoint IdentityIQ - A fast and convenient way to educate your-self or experience the new versions of the product before executing the production migration
An IAM role for use as a ECS task role
Rotate your IAM keys automatically
INDIGO Identity and Access Management service documentation
Add a description, image, and links to the iam topic page so that developers can more easily learn about it.
To associate your repository with the iam topic, visit your repo's landing page and select "manage topics."