Add AWS Network Access Analyzer Automation

This commit is contained in:
Mike Virgilio
2023-02-02 12:11:30 -06:00
committed by GitHub
parent 9e42339d91
commit af67063afa

View File

@@ -29,6 +29,7 @@ Do you want to contribute to this list? Feel free to send a PR and make sure you
| **[CloudCustodian](https://github.com/cloud-custodian/cloud-custodian/)** | Rules engine for cloud security, cost optimization, and governance, DSL in yaml for policies to query, filter, and take actions on resources |[![stars](https://badgen.net/github/stars/cloud-custodian/cloud-custodian/)](https://badgen.net/github/stars/cloud-custodian/cloud-custodian/)| [![contributors](https://badgen.net/github/contributors/cloud-custodian/cloud-custodian/)](https://badgen.net/github/contributors/cloud-custodian/cloud-custodian/)[![watchers](https://badgen.net/github/watchers/cloud-custodian/cloud-custodian/)](https://badgen.net/github/watchers/cloud-custodian/cloud-custodian/)[![last-commit](https://badgen.net/github/last-commit/cloud-custodian/cloud-custodian/)](https://badgen.net/github/last-commit/cloud-custodian/cloud-custodian/) [![open-issues](https://badgen.net/github/open-issues/cloud-custodian/cloud-custodian/)](https://badgen.net/github/open-issues/cloud-custodian/cloud-custodian/) [![closed-issues](https://badgen.net/github/closed-issues/cloud-custodian/cloud-custodian/)](https://badgen.net/github/closed-issues/cloud-custodian/cloud-custodian/) |
| **[ICE](https://github.com/Teevity/ice)** | Ice provides insights from a usage and cost perspective with high detail dashboards. |[![stars](https://badgen.net/github/stars/Teevity/ice)](https://badgen.net/github/stars/Teevity/ice)| [![contributors](https://badgen.net/github/contributors/Teevity/ice)](https://badgen.net/github/contributors/Teevity/ice)[![watchers](https://badgen.net/github/watchers/Teevity/ice)](https://badgen.net/github/watchers/Teevity/ice)[![last-commit](https://badgen.net/github/last-commit/Teevity/ice)](https://badgen.net/github/last-commit/Teevity/ice) [![open-issues](https://badgen.net/github/open-issues/Teevity/ice)](https://badgen.net/github/open-issues/Teevity/ice) [![closed-issues](https://badgen.net/github/closed-issues/Teevity/ice)](https://badgen.net/github/closed-issues/Teevity/ice) |
| **[CloudSploit Scans](https://github.com/cloudsploit/scans)** | AWS security scanning checks (NodeJS) |[![stars](https://badgen.net/github/stars/cloudsploit/scans)](https://badgen.net/github/stars/cloudsploit/scans)| [![contributors](https://badgen.net/github/contributors/cloudsploit/scans)](https://badgen.net/github/contributors/cloudsploit/scans)[![watchers](https://badgen.net/github/watchers/cloudsploit/scans)](https://badgen.net/github/watchers/cloudsploit/scans)[![last-commit](https://badgen.net/github/last-commit/cloudsploit/scans)](https://badgen.net/github/last-commit/cloudsploit/scans) [![open-issues](https://badgen.net/github/open-issues/cloudsploit/scans)](https://badgen.net/github/open-issues/cloudsploit/scans) [![closed-issues](https://badgen.net/github/closed-issues/cloudsploit/scans)](https://badgen.net/github/closed-issues/cloudsploit/scans) |
| **[AWS Network Access Analyzer](https://github.com/aws-samples/network-access-analyzer-multi-account-analysis)** | Automation for Amazon VPC Network Access Analyzer to identify all possible Internet Gateway reachability for your resources across all your AWS accounts |[![stars](https://badgen.net/github/stars/aws-samples/network-access-analyzer-multi-account-analysis)](https://badgen.net/github/stars/aws-samples/network-access-analyzer-multi-account-analysis)| [![contributors](https://badgen.net/github/contributors/aws-samples/network-access-analyzer-multi-account-analysis)](https://badgen.net/github/contributors/aws-samples/network-access-analyzer-multi-account-analysis)[![watchers](https://badgen.net/github/watchers/aws-samples/network-access-analyzer-multi-account-analysis)](https://badgen.net/github/watchers/aws-samples/network-access-analyzer-multi-account-analysis)[![last-commit](https://badgen.net/github/last-commit/aws-samples/network-access-analyzer-multi-account-analysis)](https://badgen.net/github/last-commit/aws-samples/network-access-analyzer-multi-account-analysis) [![open-issues](https://badgen.net/github/open-issues/aws-samples/network-access-analyzer-multi-account-analysis)](https://badgen.net/github/open-issues/aws-samples/network-access-analyzer-multi-account-analysis) [![closed-issues](https://badgen.net/github/closed-issues/aws-samples/network-access-analyzer-multi-account-analysis)](https://badgen.net/github/closed-issues/aws-samples/network-access-analyzer-multi-account-analysis) |
| **[CloudTracker](https://github.com/duo-labs/cloudtracker)** | helps you find over-privileged IAM users and roles by comparing CloudTrail logs with current IAM policies (Python) |[![stars](https://badgen.net/github/stars/duo-labs/cloudtracker)](https://badgen.net/github/stars/duo-labs/cloudtracker)| [![contributors](https://badgen.net/github/contributors/duo-labs/cloudtracker)](https://badgen.net/github/contributors/duo-labs/cloudtracker)[![watchers](https://badgen.net/github/watchers/duo-labs/cloudtracker)](https://badgen.net/github/watchers/duo-labs/cloudtracker)[![last-commit](https://badgen.net/github/last-commit/duo-labs/cloudtracker)](https://badgen.net/github/last-commit/duo-labs/cloudtracker) [![open-issues](https://badgen.net/github/open-issues/duo-labs/cloudtracker)](https://badgen.net/github/open-issues/duo-labs/cloudtracker) [![closed-issues](https://badgen.net/github/closed-issues/duo-labs/cloudtracker)](https://badgen.net/github/closed-issues/duo-labs/cloudtracker) |
| **[AWS Security Benchmarks](https://github.com/awslabs/aws-security-benchmark)** | scripts and templates guidance related to the AWS CIS Foundation framework (Python) |[![stars](https://badgen.net/github/stars/awslabs/aws-security-benchmark)](https://badgen.net/github/stars/awslabs/aws-security-benchmark)| [![contributors](https://badgen.net/github/contributors/awslabs/aws-security-benchmark)](https://badgen.net/github/contributors/awslabs/aws-security-benchmark)[![watchers](https://badgen.net/github/watchers/awslabs/aws-security-benchmark)](https://badgen.net/github/watchers/awslabs/aws-security-benchmark)[![last-commit](https://badgen.net/github/last-commit/awslabs/aws-security-benchmark)](https://badgen.net/github/last-commit/awslabs/aws-security-benchmark) [![open-issues](https://badgen.net/github/open-issues/awslabs/aws-security-benchmark)](https://badgen.net/github/open-issues/awslabs/aws-security-benchmark) [![closed-issues](https://badgen.net/github/closed-issues/awslabs/aws-security-benchmark)](https://badgen.net/github/closed-issues/awslabs/aws-security-benchmark) |
| **[AWS Public IPs](https://github.com/arkadiyt/aws_public_ips)** | Fetch all public IP addresses tied to your AWS account. Works with IPv4/IPv6 Classic/VPC networking and across all AWS services (Ruby) |[![stars](https://badgen.net/github/stars/arkadiyt/aws_public_ips)](https://badgen.net/github/stars/arkadiyt/aws_public_ips)| [![contributors](https://badgen.net/github/contributors/arkadiyt/aws_public_ips)](https://badgen.net/github/contributors/arkadiyt/aws_public_ips)[![watchers](https://badgen.net/github/watchers/arkadiyt/aws_public_ips)](https://badgen.net/github/watchers/arkadiyt/aws_public_ips)[![last-commit](https://badgen.net/github/last-commit/arkadiyt/aws_public_ips)](https://badgen.net/github/last-commit/arkadiyt/aws_public_ips) [![open-issues](https://badgen.net/github/open-issues/arkadiyt/aws_public_ips)](https://badgen.net/github/open-issues/arkadiyt/aws_public_ips) [![closed-issues](https://badgen.net/github/closed-issues/arkadiyt/aws_public_ips)](https://badgen.net/github/closed-issues/arkadiyt/aws_public_ips) |