find-s3-account
trailscraper
find-s3-account | trailscraper | |
---|---|---|
1 | 6 | |
37 | 762 | |
- | - | |
4.4 | 8.8 | |
3 months ago | 8 days ago | |
Python | Python | |
MIT License | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
find-s3-account
-
It's now possible to find the AWS Account ID for any S3 Bucket (private too)
For those interested, we put the code online here: https://github.com/tracebit-com/find-s3-account
trailscraper
- TrailScraper
-
How to get the exact IAM services/roles needed to run a command
I like using https://github.com/flosell/trailscraper for this
- flosell/trailscraper - a command-line tool to get valuable information out of AWS CloudTrail
- TrailScraper: A command-line tool to get valuable information out of AWS CloudTrail and a general purpose toolbox for working with IAM policies
- Trailscraper can scrape your Cloudtrail logs and generate IAM Policies from the resources and verbs used by your users or roles
-
Is there a tool that tells you which IAM actions to allow if you give it an API operation?
I’ve used this project in the past to pull out policy information https://github.com/flosell/trailscraper (it’s a CLI, FYI)
What are some alternatives?
aws-secure-environment-accelerator - The AWS Secure Environment Accelerator is a tool designed to help deploy and operate secure multi-account, multi-region AWS environments on an ongoing basis. The power of the solution is the configuration file which enables the completely automated deployment of customizable architectures within AWS without changing a single line of code.
cloudtracker - CloudTracker helps you find over-privileged IAM users and roles by comparing CloudTrail logs with current IAM policies.
parliament - AWS IAM linting library
aws-leastprivilege - Generates an IAM policy for the CloudFormation service role that adheres to least privilege.
cloudsplaining - Cloudsplaining is an AWS IAM Security Assessment tool that identifies violations of least privilege and generates a risk-prioritized report.
aws-cloudformation-templates - A collection of useful CloudFormation templates
iamlive - Generate an IAM policy from AWS, Azure, or Google Cloud (GCP) calls using client-side monitoring (CSM) or embedded proxy
aws-allowlister - Automatically compile an AWS Service Control Policy that ONLY allows AWS services that are compliant with your preferred compliance frameworks.
actionhero
my-arsenal-of-aws-security-tools - List of open source tools for AWS security: defensive, offensive, auditing, DFIR, etc.
sso-setup-automation - AWS IAM Identity Center - Automated Setup
action-aws-iam-assume-role - GitHub Action to assume an AWS IAM role via OpenID Connect (OIDC) or a plain old IAM user.