cloudtracker
CloudTracker helps you find over-privileged IAM users and roles by comparing CloudTrail logs with current IAM policies. (by duo-labs)
repokid
AWS Least Privilege for Distributed, High-Velocity Deployment (by Netflix)
cloudtracker | repokid | |
---|---|---|
3 | 2 | |
863 | 1,093 | |
0.0% | 0.8% | |
0.0 | 0.0 | |
over 2 years ago | 10 months ago | |
Python | Python | |
BSD 3-clause "New" or "Revised" License | Apache License 2.0 |
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
cloudtracker
Posts with mentions or reviews of cloudtracker.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2023-07-12.
-
WANTED: People wishing to clean up their IAM environment - Try Our Tool for Free
How does it differ from AWS access advisor, Cloudtracker or Repokid? Can you export the results? Is it a SaaS or can it be run locally?
- duo-labs/cloudtracker - CloudTracker helps you find over-privileged IAM users and roles by comparing CloudTrail logs with current IAM policies.
-
Is there a tool that tells you which IAM actions to allow if you give it an API operation?
There are a few tools around that do this. There is another to show you what permissions a role or user has used in the last x time period. https://github.com/duo-labs/cloudtracker
repokid
Posts with mentions or reviews of repokid.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2023-12-04.
-
Launch HN: Slauth (YC S22) – auto-generate secure IAM policies for AWS and GCP
that's a false dichotomy. there are approaches to this problem that are powered by neither humans nor LLMs -- see https://github.com/Netflix/Repokid as an example
-
WANTED: People wishing to clean up their IAM environment - Try Our Tool for Free
How does it differ from AWS access advisor, Cloudtracker or Repokid? Can you export the results? Is it a SaaS or can it be run locally?
What are some alternatives?
When comparing cloudtracker and repokid you can also consider the following projects:
trailscraper - A command-line tool to get valuable information out of AWS CloudTrail
bless - Repository for BLESS, an SSH Certificate Authority that runs as a AWS Lambda function
parliament - AWS IAM linting library
policy_sentry - IAM Least Privilege Policy Generator
actionhero
slauth-cli - CLI that scans directories for Cloud Provider SDK usage generates the IAM Policies/Permissions needed