trailscraper
parliament
trailscraper | parliament | |
---|---|---|
6 | 7 | |
761 | 986 | |
- | 0.6% | |
8.8 | 1.5 | |
3 days ago | 15 days ago | |
Python | Python | |
Apache License 2.0 | BSD 3-clause "New" or "Revised" License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
trailscraper
- TrailScraper
-
How to get the exact IAM services/roles needed to run a command
I like using https://github.com/flosell/trailscraper for this
- flosell/trailscraper - a command-line tool to get valuable information out of AWS CloudTrail
- TrailScraper: A command-line tool to get valuable information out of AWS CloudTrail and a general purpose toolbox for working with IAM policies
- Trailscraper can scrape your Cloudtrail logs and generate IAM Policies from the resources and verbs used by your users or roles
-
Is there a tool that tells you which IAM actions to allow if you give it an API operation?
I’ve used this project in the past to pull out policy information https://github.com/flosell/trailscraper (it’s a CLI, FYI)
parliament
-
AWS Creates New Policy-Based Access Control Language Cedar
All of the sdks support client side monitoring (CSM), so these sort of tools can be built client side. https://boto3.amazonaws.com/v1/documentation/api/1.10.46/gui...
afaics the only challenge is mapping some of the apis to iam as its only 85% 1:1
There's also tools for helping with iam like (generator, and linter)
https://github.com/salesforce/policy_sentry
https://github.com/duo-labs/parliament
- parliament
- Is there a way to test policies without the AWS policy simulator? maybe an API or library?
-
IAM Role & Policy request - Automated review
There are IAM linting libraries like parliament (https://github.com/duo-labs/parliament) that can be used to build a solution like the one you described. There are also some other open source tools that use it for security purposes. You'd probably have to customize them for use in your own CICD processes.
-
Actions, resources, and condition keys for AWS services - is there an API for this document?
No API, but you can generate JSON output using https://github.com/duo-labs/parliament (or a modified version that includes undocumented actions at https://github.com/iann0036/iam-dataset/blob/main/iam\_definition.json).
-
I built a Power Editor that makes IAM creation simpler
Sift through 9000+ privileges in just a few key presses, ARN's are instantly recommended and their input/validation is streamlined. Additional statements can be added via hotkey, and your policy will be checked in real-time for syntax errors or other bugs (thanks Parliament!).
-
Is there a tool that tells you which IAM actions to allow if you give it an API operation?
I've been literally tweeting at aws for a long time now for a tool like this lol, haven't found anything. but you can play around with Parliament
What are some alternatives?
aws-secure-environment-accelerator - The AWS Secure Environment Accelerator is a tool designed to help deploy and operate secure multi-account, multi-region AWS environments on an ongoing basis. The power of the solution is the configuration file which enables the completely automated deployment of customizable architectures within AWS without changing a single line of code.
iamzero - Identity & Access Management simplified and secure.
cloudtracker - CloudTracker helps you find over-privileged IAM users and roles by comparing CloudTrail logs with current IAM policies.
aws-leastprivilege - Generates an IAM policy for the CloudFormation service role that adheres to least privilege.
iamlive - Generate an IAM policy from AWS, Azure, or Google Cloud (GCP) calls using client-side monitoring (CSM) or embedded proxy
cloudsplaining - Cloudsplaining is an AWS IAM Security Assessment tool that identifies violations of least privilege and generates a risk-prioritized report.
policy_sentry - IAM Least Privilege Policy Generator
aws-cloudformation-templates - A collection of useful CloudFormation templates
spicedb - Open Source, Google Zanzibar-inspired permissions database to enable fine-grained access control for customer applications
cel-spec - Common Expression Language -- specification and binary representation