aws
terraform-aws-secure-baseline
aws | terraform-aws-secure-baseline | |
---|---|---|
5 | 1 | |
20 | 1,117 | |
- | - | |
9.1 | 0.0 | |
almost 2 years ago | about 1 month ago | |
HCL | HCL | |
Mozilla Public License 2.0 | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
aws
-
Running AWS Foundational Security Best Practices with CloudQuery Policies
Do you have a policy that you want to codify, or that you’ve been running with python or bash scripts? You are welcome to try codifying it with CloudQuery Policies (See our github and docs for how to develop one). Feel free to visit our discord or GitHub to get help - we’ll also be happy to share your policy on CloudQuery Hub.
-
What are policies and how do you use them with CloudQuery?
CloudQuery is an open-source cloud asset inventory powered by SQL, so a policy to the tool is simply an HCL configuration file that references SQL queries. How this works is by CloudQuery ingesting the data from your cloud provider, such as AWS or Azure, and then the policy executes the SQL statements against that data as if it were a test suite. Our co-founder Yevgeny recently wrote an amazing piece on running the PCI DSS policy against AWS. If you are curious about the multitude of policies currently available you can check them out at https://hub.cloudquery.io/ which is our centrally available and searchable source for publicly available policies.
- Open Source Customizable AWS PCI DSS Scan with SQL
terraform-aws-secure-baseline
-
Curated GitHub repository on how organisations around the world use AWS
I found this -https://github.com/nozaq/terraform-aws-secure-baseline
What are some alternatives?
cloudquery - The open source high performance ELT framework powered by Apache Arrow
CIS-Ubuntu-20.04-Ansible - Ansible Role to Automate CIS v1.1.0 Ubuntu Linux 18.04 LTS, 20.04 LTS Remediation
terraform-aws-eks-blueprints - Configure and deploy complete EKS clusters.
prowler - Prowler is an Open Source Security tool for AWS, Azure, GCP and Kubernetes to do security assessments, audits, incident response, compliance, continuous monitoring, hardening and forensics readiness. Includes CIS, NIST 800, NIST CSF, CISA, FedRAMP, PCI-DSS, GDPR, HIPAA, FFIEC, SOC2, GXP, Well-Architected Security, ENS and more
terraform-aws-eks - Terraform module to create AWS Elastic Kubernetes (EKS) resources 🇺🇦
terraform-aws-elasticache-redis - Terraform module to provision an ElastiCache Redis Cluster
steampipe-mod-aws-compliance - Run individual controls or full compliance benchmarks for CIS, PCI, NIST, HIPAA and more across all of your AWS accounts using Powerpipe and Steampipe.
terragrunt-infrastructure-modules-example - A repo used to show examples file/folder structures you can use with Terragrunt and Terraform
terrascan - Detect compliance and security violations across Infrastructure as Code to mitigate risk before provisioning cloud native infrastructure.
terraform-aws-rds-aurora - Terraform module to create AWS RDS Aurora resources 🇺🇦
gcp-label - Identify which instances are having the biggest impact on your GCP bill
terraform-github-action-cache-example - Caching Terraform providers within a GitHub Actions Workflow run to improve execution times.