mirror of
https://github.com/toniblyx/my-arsenal-of-aws-security-tools.git
synced 2025-12-17 08:04:20 +01:00
Add AWS Network Access Analyzer Automation
This commit is contained in:
@@ -29,6 +29,7 @@ Do you want to contribute to this list? Feel free to send a PR and make sure you
|
||||
| **[CloudCustodian](https://github.com/cloud-custodian/cloud-custodian/)** | Rules engine for cloud security, cost optimization, and governance, DSL in yaml for policies to query, filter, and take actions on resources |[](https://badgen.net/github/stars/cloud-custodian/cloud-custodian/)| [](https://badgen.net/github/contributors/cloud-custodian/cloud-custodian/)[](https://badgen.net/github/watchers/cloud-custodian/cloud-custodian/)[](https://badgen.net/github/last-commit/cloud-custodian/cloud-custodian/) [](https://badgen.net/github/open-issues/cloud-custodian/cloud-custodian/) [](https://badgen.net/github/closed-issues/cloud-custodian/cloud-custodian/) |
|
||||
| **[ICE](https://github.com/Teevity/ice)** | Ice provides insights from a usage and cost perspective with high detail dashboards. |[](https://badgen.net/github/stars/Teevity/ice)| [](https://badgen.net/github/contributors/Teevity/ice)[](https://badgen.net/github/watchers/Teevity/ice)[](https://badgen.net/github/last-commit/Teevity/ice) [](https://badgen.net/github/open-issues/Teevity/ice) [](https://badgen.net/github/closed-issues/Teevity/ice) |
|
||||
| **[CloudSploit Scans](https://github.com/cloudsploit/scans)** | AWS security scanning checks (NodeJS) |[](https://badgen.net/github/stars/cloudsploit/scans)| [](https://badgen.net/github/contributors/cloudsploit/scans)[](https://badgen.net/github/watchers/cloudsploit/scans)[](https://badgen.net/github/last-commit/cloudsploit/scans) [](https://badgen.net/github/open-issues/cloudsploit/scans) [](https://badgen.net/github/closed-issues/cloudsploit/scans) |
|
||||
| **[AWS Network Access Analyzer](https://github.com/aws-samples/network-access-analyzer-multi-account-analysis)** | Automation for Amazon VPC Network Access Analyzer to identify all possible Internet Gateway reachability for your resources across all your AWS accounts |[](https://badgen.net/github/stars/aws-samples/network-access-analyzer-multi-account-analysis)| [](https://badgen.net/github/contributors/aws-samples/network-access-analyzer-multi-account-analysis)[](https://badgen.net/github/watchers/aws-samples/network-access-analyzer-multi-account-analysis)[](https://badgen.net/github/last-commit/aws-samples/network-access-analyzer-multi-account-analysis) [](https://badgen.net/github/open-issues/aws-samples/network-access-analyzer-multi-account-analysis) [](https://badgen.net/github/closed-issues/aws-samples/network-access-analyzer-multi-account-analysis) |
|
||||
| **[CloudTracker](https://github.com/duo-labs/cloudtracker)** | helps you find over-privileged IAM users and roles by comparing CloudTrail logs with current IAM policies (Python) |[](https://badgen.net/github/stars/duo-labs/cloudtracker)| [](https://badgen.net/github/contributors/duo-labs/cloudtracker)[](https://badgen.net/github/watchers/duo-labs/cloudtracker)[](https://badgen.net/github/last-commit/duo-labs/cloudtracker) [](https://badgen.net/github/open-issues/duo-labs/cloudtracker) [](https://badgen.net/github/closed-issues/duo-labs/cloudtracker) |
|
||||
| **[AWS Security Benchmarks](https://github.com/awslabs/aws-security-benchmark)** | scripts and templates guidance related to the AWS CIS Foundation framework (Python) |[](https://badgen.net/github/stars/awslabs/aws-security-benchmark)| [](https://badgen.net/github/contributors/awslabs/aws-security-benchmark)[](https://badgen.net/github/watchers/awslabs/aws-security-benchmark)[](https://badgen.net/github/last-commit/awslabs/aws-security-benchmark) [](https://badgen.net/github/open-issues/awslabs/aws-security-benchmark) [](https://badgen.net/github/closed-issues/awslabs/aws-security-benchmark) |
|
||||
| **[AWS Public IPs](https://github.com/arkadiyt/aws_public_ips)** | Fetch all public IP addresses tied to your AWS account. Works with IPv4/IPv6 Classic/VPC networking and across all AWS services (Ruby) |[](https://badgen.net/github/stars/arkadiyt/aws_public_ips)| [](https://badgen.net/github/contributors/arkadiyt/aws_public_ips)[](https://badgen.net/github/watchers/arkadiyt/aws_public_ips)[](https://badgen.net/github/last-commit/arkadiyt/aws_public_ips) [](https://badgen.net/github/open-issues/arkadiyt/aws_public_ips) [](https://badgen.net/github/closed-issues/arkadiyt/aws_public_ips) |
|
||||
|
||||
Reference in New Issue
Block a user