consoleme
cerbos
consoleme | cerbos | |
---|---|---|
10 | 42 | |
3,065 | 2,530 | |
0.2% | 4.2% | |
0.0 | 9.6 | |
6 months ago | 2 days ago | |
Python | Go | |
Apache License 2.0 | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
consoleme
-
Launch HN: Slauth (YC S22) – auto-generate secure IAM policies for AWS and GCP
Why are you using (very expensive) GPT, or any LLM for that matter, when this was already a solved problem using rulesets? Netflix for example has open source that does this already: https://github.com/Netflix/consoleme
Instead of analyzing your code, you just run your code with no permissions and it automatically detects permission failures and thens open those permissions, with a UI showing you what it did so you can remove any permissions you don't want.
That actually seems much more secure than trying to divine the rules from reading the code.
What value is the LLM adding here?
-
AWS SSO: Strategy for access to all member accounts
You may also want to look into Netflix’s ConsoleMe https://github.com/Netflix/consoleme
-
AWS IAM Roles, a tale of unnecessary complexity
This is the way. I’ve seen this happen countless times. It’s happened to me too. It’s happened to colleagues.
The worst case I’m aware of from first-hand knowledge was a large cluster of resources that got deployed for a product demo by a sales engineer and forgotten about. Turned into a nice ~$100,000 surprise in the quarterly budget.
Netflix built a tool for managing IAM permission requests as an auditable workflow, called ConsoleMe: https://github.com/Netflix/consoleme
-
How do you handle IAM requests?
There’s this tool as well https://github.com/Netflix/consoleme among others, check them out and see if the overhead is ok for you all now, but keep it simple to start.
-
Permissions manager
Perhaps Consoleme from Netflix is a useful tool for you?
- Netflix/Consoleme: A Central Control Plane for AWS Permissions and Access
-
Anyone willing to be an AWS mentor?
For sure, you can DM me. Might want to check out https://github.com/Netflix/consoleme too
- Netflix Open Sources ConsoleMe to Manage Permissions and Access on AWS
-
I built a tool which automatically suggests least-privilege IAM policies
The tool is in a similar space to iamlive, policy_sentry, and consoleme (all of which are worth checking out too if you're interested in making AWS security easier) but the main points of difference I see are:
-
Zero knowledge of multiple accounts/cross accounts rolea/budgets/consolidated bill etc. Any good resources to read ?
After you read the resources, you can stand on the "shoulders of giants" https://github.com/Netflix/consoleme
cerbos
-
How to Implement Authorization in React JS
Here, Cerbos comes into the picture.
- Open Policy Agent
-
Nuxt authorization: How to implement fine-grained access control
In this tutorial you will learn how to use Cerbos to add fine-grained access control to any Nuxt web application, simplifying authorization as a result.
-
🖌️⚙️ Innovate Like Da Vinci: Blending Art and Science in Software Development
In my work with Cerbos, I apply the lessons learned from Da Vinci to tackle authorization challenges. Our approach is to create solutions where functionality seamlessly integrates with developer experience. Constantly iterating and viewing the tools through the users' lens, helps ensure that our access control solutions are robust and dev-friendly.
-
Get started with Cerbos Hub
You may already know of our open source solution - Cerbos Policy Decision Point (PDP); a devtool which helps developers enforce access control over different parts of their software. If you need to learn more about Cerbos in general, we strongly recommend checking out the website and the docs.
- 💻 7 Open-Source DevTools That Save Time You Didn't Know to Exist ⌛🚀
-
Cerbos v0.32 released!
GitHub: https://github.com/cerbos/cerbos URL: https://cerbos.dev
-
Feedback needed: Cerbos Hub is now in public beta
Cerbos Hub is a managed service offering for the open source authorization product, Cerbos.
-
Feedback needed: Cerbos Hub is now in public beta!
Hello fellow devs! I'm with Cerbos (https://cerbos.dev/), a tool designed to manage who can do what in your software applications.
What are some alternatives?
aws-iam-generator - Generate Multi-Account IAM users/groups/roles/policies from a simple YAML configuration file and Jinja2 templates.
OPA (Open Policy Agent) - Open Policy Agent (OPA) is an open source, general-purpose policy engine.
iamlive - Generate an IAM policy from AWS, Azure, or Google Cloud (GCP) calls using client-side monitoring (CSM) or embedded proxy
casbin-server - Casbin as a Service (CaaS)
policy_sentry - IAM Least Privilege Policy Generator
Ory Keto - Open Source (Go) implementation of "Zanzibar: Google's Consistent, Global Authorization System". Ships gRPC, REST APIs, newSQL, and an easy and granular permission language. Supports ACL, RBAC, and other access models.
tfquery - tfquery: Run SQL queries on your Terraform infrastructure. Query resources and analyze its configuration using a SQL-powered framework.
oso - Oso is a batteries-included framework for building authorization in your application.
AirIAM - Least privilege AWS IAM Terraformer
opa-envoy-plugin - A plugin to enforce OPA policies with Envoy
ElectricEye - ElectricEye is a multi-cloud, multi-SaaS Python CLI tool for Asset Management, Security Posture Management & Attack Surface Monitoring supporting 100s of services and evaluations to harden your CSP & SaaS environments with controls mapped to over 20 industry, regulatory, and best practice controls frameworks
sso-wall-of-shame - A list of vendors that treat single sign-on as a luxury feature, not a core security requirement.