Find AWS IAM permissions used by Go code
-
Updated
Feb 5, 2024 - Go
Find AWS IAM permissions used by Go code
This project shows a complete use case with the least privilege principle on Google Cloud using modular Terraform, Terragrunt and Cloud Build
The GenCyber 10 Security First Principles are a set of fundamental best practices and guidelines for cybersecurity
📚 ☁️ For Architects and Engineers ☁️ 📚
gcloud script to provision my GKE cluster, in a secure way
Catalog and understand risks from granting IAM privileges
TOTP MFA for teams: Shamir's Secret Sharing and zero trust OTP generation
command line interface for Permify
Validate all your Customer IAM Policies against AWS Access Analyzer - Policy Validation
Cloud governance reports from native services in a clear and readable digest
🔐 Lightning fast, global scale authorization service without the overhead of yet another DSL.
Create a break glass role for emergency use in order to limit AWS production account access. Configure automatic alerts and logging of activities in the role to secure its use in production environments.
Rapid7 | insightCloudSec | Kubernetes RBAC Power Toys - Visualize, Analyze, Generate & Query
Generate an IAM policy from AWS, Azure, or Google Cloud (GCP) calls using client-side monitoring (CSM) or embedded proxy
Open source authorization service inspired by Google Zanzibar to build fine-grained and scalable authorization systems.
Add a description, image, and links to the least-privilege topic page so that developers can more easily learn about it.
To associate your repository with the least-privilege topic, visit your repo's landing page and select "manage topics."