📚 ☁️ For Architects and Engineers ☁️ 📚
-
Updated
Dec 15, 2018
📚 ☁️ For Architects and Engineers ☁️ 📚
Validate all your Customer IAM Policies against AWS Access Analyzer - Policy Validation
TOTP MFA for teams: Shamir's Secret Sharing and zero trust OTP generation
gcloud script to provision my GKE cluster, in a secure way
This project shows a complete use case with the least privilege principle on Google Cloud using modular Terraform, Terragrunt and Cloud Build
Cloud governance reports from native services in a clear and readable digest
Create a break glass role for emergency use in order to limit AWS production account access. Configure automatic alerts and logging of activities in the role to secure its use in production environments.
Find AWS IAM permissions used by Go code
Generate an IAM policy from AWS, Azure, or Google Cloud (GCP) calls using client-side monitoring (CSM) or embedded proxy
command line interface for Permify
The GenCyber 10 Security First Principles are a set of fundamental best practices and guidelines for cybersecurity
Rapid7 | insightCloudSec | Kubernetes RBAC Power Toys - Visualize, Analyze, Generate & Query
🔐 Lightning fast, global scale authorization service without the overhead of yet another DSL.
Catalog and understand risks from granting IAM privileges
Open source authorization service inspired by Google Zanzibar to build fine-grained and scalable authorization systems.
Add a description, image, and links to the least-privilege topic page so that developers can more easily learn about it.
To associate your repository with the least-privilege topic, visit your repo's landing page and select "manage topics."