List of open source tools for AWS security: defensive, offensive, auditing, DFIR, etc.
-
Updated
Jan 19, 2024 - Shell
List of open source tools for AWS security: defensive, offensive, auditing, DFIR, etc.
SSH over AWS SSM. No bastions or public-facing instances. SSH user management through IAM. No requirement to store SSH keys locally or on server.
An example of how Entitlements can be configured
Fetch AWS keys and secrets from ~/.aws/credentials using a simple bash script
Reverse auth proxy container for OAuth/OpenID Connect
Notes, Docs, CLI Commands and, Flashcards for AWS certified solutions architect - Associate Level
Test IAM Policies in Multi Account Structures in your CI/CD pipeline
A Buildkite plugin to assume-role-with-web-identity using a Buildkite OIDC token before running the build command
AWS IAM Security Toolkit: CIS Benchmarks | Enumeration | Privilege Escalation
Ansible Module to automate the VM provisioning, destroying, reconfiguring ops in Xen (IaC).
The one-stop place to learn/experience the examples, use-cases, demonstrations, and resources related to microservices security patterns with Ballerina, which is an open-source programming language for the cloud that makes it easier to use, combine, and create network services.
Rotate your IAM keys automatically
Better friend for your MFA-forced IAM user and kubectl command.
Add a description, image, and links to the iam topic page so that developers can more easily learn about it.
To associate your repository with the iam topic, visit your repo's landing page and select "manage topics."