From af67063afab814b30c59d4686b20de0c8ffd1940 Mon Sep 17 00:00:00 2001 From: Mike Virgilio <55411004+micvirgi@users.noreply.github.com> Date: Thu, 2 Feb 2023 12:11:30 -0600 Subject: [PATCH] Add AWS Network Access Analyzer Automation --- README.md | 1 + 1 file changed, 1 insertion(+) diff --git a/README.md b/README.md index 4a4a970..7ce522f 100644 --- a/README.md +++ b/README.md @@ -29,6 +29,7 @@ Do you want to contribute to this list? Feel free to send a PR and make sure you | **[CloudCustodian](https://github.com/cloud-custodian/cloud-custodian/)** | Rules engine for cloud security, cost optimization, and governance, DSL in yaml for policies to query, filter, and take actions on resources |[![stars](https://badgen.net/github/stars/cloud-custodian/cloud-custodian/)](https://badgen.net/github/stars/cloud-custodian/cloud-custodian/)| [![contributors](https://badgen.net/github/contributors/cloud-custodian/cloud-custodian/)](https://badgen.net/github/contributors/cloud-custodian/cloud-custodian/)[![watchers](https://badgen.net/github/watchers/cloud-custodian/cloud-custodian/)](https://badgen.net/github/watchers/cloud-custodian/cloud-custodian/)[![last-commit](https://badgen.net/github/last-commit/cloud-custodian/cloud-custodian/)](https://badgen.net/github/last-commit/cloud-custodian/cloud-custodian/) [![open-issues](https://badgen.net/github/open-issues/cloud-custodian/cloud-custodian/)](https://badgen.net/github/open-issues/cloud-custodian/cloud-custodian/) [![closed-issues](https://badgen.net/github/closed-issues/cloud-custodian/cloud-custodian/)](https://badgen.net/github/closed-issues/cloud-custodian/cloud-custodian/) | | **[ICE](https://github.com/Teevity/ice)** | Ice provides insights from a usage and cost perspective with high detail dashboards. |[![stars](https://badgen.net/github/stars/Teevity/ice)](https://badgen.net/github/stars/Teevity/ice)| [![contributors](https://badgen.net/github/contributors/Teevity/ice)](https://badgen.net/github/contributors/Teevity/ice)[![watchers](https://badgen.net/github/watchers/Teevity/ice)](https://badgen.net/github/watchers/Teevity/ice)[![last-commit](https://badgen.net/github/last-commit/Teevity/ice)](https://badgen.net/github/last-commit/Teevity/ice) [![open-issues](https://badgen.net/github/open-issues/Teevity/ice)](https://badgen.net/github/open-issues/Teevity/ice) [![closed-issues](https://badgen.net/github/closed-issues/Teevity/ice)](https://badgen.net/github/closed-issues/Teevity/ice) | | **[CloudSploit Scans](https://github.com/cloudsploit/scans)** | AWS security scanning checks (NodeJS) |[![stars](https://badgen.net/github/stars/cloudsploit/scans)](https://badgen.net/github/stars/cloudsploit/scans)| [![contributors](https://badgen.net/github/contributors/cloudsploit/scans)](https://badgen.net/github/contributors/cloudsploit/scans)[![watchers](https://badgen.net/github/watchers/cloudsploit/scans)](https://badgen.net/github/watchers/cloudsploit/scans)[![last-commit](https://badgen.net/github/last-commit/cloudsploit/scans)](https://badgen.net/github/last-commit/cloudsploit/scans) [![open-issues](https://badgen.net/github/open-issues/cloudsploit/scans)](https://badgen.net/github/open-issues/cloudsploit/scans) [![closed-issues](https://badgen.net/github/closed-issues/cloudsploit/scans)](https://badgen.net/github/closed-issues/cloudsploit/scans) | +| **[AWS Network Access Analyzer](https://github.com/aws-samples/network-access-analyzer-multi-account-analysis)** | Automation for Amazon VPC Network Access Analyzer to identify all possible Internet Gateway reachability for your resources across all your AWS accounts |[![stars](https://badgen.net/github/stars/aws-samples/network-access-analyzer-multi-account-analysis)](https://badgen.net/github/stars/aws-samples/network-access-analyzer-multi-account-analysis)| [![contributors](https://badgen.net/github/contributors/aws-samples/network-access-analyzer-multi-account-analysis)](https://badgen.net/github/contributors/aws-samples/network-access-analyzer-multi-account-analysis)[![watchers](https://badgen.net/github/watchers/aws-samples/network-access-analyzer-multi-account-analysis)](https://badgen.net/github/watchers/aws-samples/network-access-analyzer-multi-account-analysis)[![last-commit](https://badgen.net/github/last-commit/aws-samples/network-access-analyzer-multi-account-analysis)](https://badgen.net/github/last-commit/aws-samples/network-access-analyzer-multi-account-analysis) [![open-issues](https://badgen.net/github/open-issues/aws-samples/network-access-analyzer-multi-account-analysis)](https://badgen.net/github/open-issues/aws-samples/network-access-analyzer-multi-account-analysis) [![closed-issues](https://badgen.net/github/closed-issues/aws-samples/network-access-analyzer-multi-account-analysis)](https://badgen.net/github/closed-issues/aws-samples/network-access-analyzer-multi-account-analysis) | | **[CloudTracker](https://github.com/duo-labs/cloudtracker)** | helps you find over-privileged IAM users and roles by comparing CloudTrail logs with current IAM policies (Python) |[![stars](https://badgen.net/github/stars/duo-labs/cloudtracker)](https://badgen.net/github/stars/duo-labs/cloudtracker)| [![contributors](https://badgen.net/github/contributors/duo-labs/cloudtracker)](https://badgen.net/github/contributors/duo-labs/cloudtracker)[![watchers](https://badgen.net/github/watchers/duo-labs/cloudtracker)](https://badgen.net/github/watchers/duo-labs/cloudtracker)[![last-commit](https://badgen.net/github/last-commit/duo-labs/cloudtracker)](https://badgen.net/github/last-commit/duo-labs/cloudtracker) [![open-issues](https://badgen.net/github/open-issues/duo-labs/cloudtracker)](https://badgen.net/github/open-issues/duo-labs/cloudtracker) [![closed-issues](https://badgen.net/github/closed-issues/duo-labs/cloudtracker)](https://badgen.net/github/closed-issues/duo-labs/cloudtracker) | | **[AWS Security Benchmarks](https://github.com/awslabs/aws-security-benchmark)** | scripts and templates guidance related to the AWS CIS Foundation framework (Python) |[![stars](https://badgen.net/github/stars/awslabs/aws-security-benchmark)](https://badgen.net/github/stars/awslabs/aws-security-benchmark)| [![contributors](https://badgen.net/github/contributors/awslabs/aws-security-benchmark)](https://badgen.net/github/contributors/awslabs/aws-security-benchmark)[![watchers](https://badgen.net/github/watchers/awslabs/aws-security-benchmark)](https://badgen.net/github/watchers/awslabs/aws-security-benchmark)[![last-commit](https://badgen.net/github/last-commit/awslabs/aws-security-benchmark)](https://badgen.net/github/last-commit/awslabs/aws-security-benchmark) [![open-issues](https://badgen.net/github/open-issues/awslabs/aws-security-benchmark)](https://badgen.net/github/open-issues/awslabs/aws-security-benchmark) [![closed-issues](https://badgen.net/github/closed-issues/awslabs/aws-security-benchmark)](https://badgen.net/github/closed-issues/awslabs/aws-security-benchmark) | | **[AWS Public IPs](https://github.com/arkadiyt/aws_public_ips)** | Fetch all public IP addresses tied to your AWS account. Works with IPv4/IPv6 Classic/VPC networking and across all AWS services (Ruby) |[![stars](https://badgen.net/github/stars/arkadiyt/aws_public_ips)](https://badgen.net/github/stars/arkadiyt/aws_public_ips)| [![contributors](https://badgen.net/github/contributors/arkadiyt/aws_public_ips)](https://badgen.net/github/contributors/arkadiyt/aws_public_ips)[![watchers](https://badgen.net/github/watchers/arkadiyt/aws_public_ips)](https://badgen.net/github/watchers/arkadiyt/aws_public_ips)[![last-commit](https://badgen.net/github/last-commit/arkadiyt/aws_public_ips)](https://badgen.net/github/last-commit/arkadiyt/aws_public_ips) [![open-issues](https://badgen.net/github/open-issues/arkadiyt/aws_public_ips)](https://badgen.net/github/open-issues/arkadiyt/aws_public_ips) [![closed-issues](https://badgen.net/github/closed-issues/arkadiyt/aws_public_ips)](https://badgen.net/github/closed-issues/arkadiyt/aws_public_ips) |