cloudtracker
parliament
cloudtracker | parliament | |
---|---|---|
3 | 7 | |
863 | 988 | |
0.0% | 0.8% | |
0.0 | 1.5 | |
over 2 years ago | 9 days ago | |
Python | Python | |
BSD 3-clause "New" or "Revised" License | BSD 3-clause "New" or "Revised" License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
cloudtracker
-
WANTED: People wishing to clean up their IAM environment - Try Our Tool for Free
How does it differ from AWS access advisor, Cloudtracker or Repokid? Can you export the results? Is it a SaaS or can it be run locally?
- duo-labs/cloudtracker - CloudTracker helps you find over-privileged IAM users and roles by comparing CloudTrail logs with current IAM policies.
-
Is there a tool that tells you which IAM actions to allow if you give it an API operation?
There are a few tools around that do this. There is another to show you what permissions a role or user has used in the last x time period. https://github.com/duo-labs/cloudtracker
parliament
-
AWS Creates New Policy-Based Access Control Language Cedar
All of the sdks support client side monitoring (CSM), so these sort of tools can be built client side. https://boto3.amazonaws.com/v1/documentation/api/1.10.46/gui...
afaics the only challenge is mapping some of the apis to iam as its only 85% 1:1
There's also tools for helping with iam like (generator, and linter)
https://github.com/salesforce/policy_sentry
https://github.com/duo-labs/parliament
- parliament
- Is there a way to test policies without the AWS policy simulator? maybe an API or library?
-
IAM Role & Policy request - Automated review
There are IAM linting libraries like parliament (https://github.com/duo-labs/parliament) that can be used to build a solution like the one you described. There are also some other open source tools that use it for security purposes. You'd probably have to customize them for use in your own CICD processes.
-
Actions, resources, and condition keys for AWS services - is there an API for this document?
No API, but you can generate JSON output using https://github.com/duo-labs/parliament (or a modified version that includes undocumented actions at https://github.com/iann0036/iam-dataset/blob/main/iam\_definition.json).
-
I built a Power Editor that makes IAM creation simpler
Sift through 9000+ privileges in just a few key presses, ARN's are instantly recommended and their input/validation is streamlined. Additional statements can be added via hotkey, and your policy will be checked in real-time for syntax errors or other bugs (thanks Parliament!).
-
Is there a tool that tells you which IAM actions to allow if you give it an API operation?
I've been literally tweeting at aws for a long time now for a tool like this lol, haven't found anything. but you can play around with Parliament
What are some alternatives?
trailscraper - A command-line tool to get valuable information out of AWS CloudTrail
actionhero
iamzero - Identity & Access Management simplified and secure.
repokid - AWS Least Privilege for Distributed, High-Velocity Deployment
iamlive - Generate an IAM policy from AWS, Azure, or Google Cloud (GCP) calls using client-side monitoring (CSM) or embedded proxy
policy_sentry - IAM Least Privilege Policy Generator
spicedb - Open Source, Google Zanzibar-inspired permissions database to enable fine-grained access control for customer applications
cel-spec - Common Expression Language -- specification and binary representation