Open source authorization service inspired by Google Zanzibar to build fine-grained and scalable authorization systems.
-
Updated
May 29, 2024 - Go
Open source authorization service inspired by Google Zanzibar to build fine-grained and scalable authorization systems.
Generate an IAM policy from AWS, Azure, or Google Cloud (GCP) calls using client-side monitoring (CSM) or embedded proxy
Rapid7 | insightCloudSec | Kubernetes RBAC Power Toys - Visualize, Analyze, Generate & Query
Create a break glass role for emergency use in order to limit AWS production account access. Configure automatic alerts and logging of activities in the role to secure its use in production environments.
🔐 Lightning fast, global scale authorization service without the overhead of yet another DSL.
Validate all your Customer IAM Policies against AWS Access Analyzer - Policy Validation
Cloud governance reports from native services in a clear and readable digest
TOTP MFA for teams: Shamir's Secret Sharing and zero trust OTP generation
command line interface for Permify
Catalog and understand risks from granting IAM privileges
📚 ☁️ For Architects and Engineers ☁️ 📚
gcloud script to provision my GKE cluster, in a secure way
Find AWS IAM permissions used by Go code
This project shows a complete use case with the least privilege principle on Google Cloud using modular Terraform, Terragrunt and Cloud Build
The GenCyber 10 Security First Principles are a set of fundamental best practices and guidelines for cybersecurity
Add a description, image, and links to the least-privilege topic page so that developers can more easily learn about it.
To associate your repository with the least-privilege topic, visit your repo's landing page and select "manage topics."