SaaSHub helps you find the best software and product alternatives Learn more →
Aws-config-rules Alternatives
Similar projects and alternatives to aws-config-rules
-
cloudformation-guard
Guard offers a policy-as-code domain-specific language (DSL) to write rules and validate JSON- and YAML-formatted data such as CloudFormation Templates, K8s configurations, and Terraform JSON plans/configurations against those rules. Take this survey to provide feedback about cfn-guard: https://amazonmr.au1.qualtrics.com/jfe/form/SV_bpyzpfoYGGuuUl0
-
InfluxDB
Power Real-Time Data Analytics at Scale. Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
-
terraform-aws-config
This module configures AWS Config, a service that enables you to assess, audit, and evaluate the configurations of your AWS resources.
aws-config-rules reviews and mentions
- ¿Es AWS seguro?
-
New AWS Config Rules - LambdaLess and rusty
You can see the whole 440 line Lambda function in the AWS Config Rules repository on github.
-
Centralising audit, compliance and incident detection
AWS provide a set of sample templates for conformance packs. We will use the 'Operational Best Practices for Security, Identity and Compliance Services'. The template is available in this GitHub repo
-
What are some pros in choosing GCP over AWS or Azure as of today?
As others have said - AWS is more complete and mature. They have everything but got to make all the mistakes first. Sometimes though this means that what you get is just a massive collection of parts with partial instructions. Conformance Packs for AWS Organizations to me is just ridiculous. You might think it's a complete solution until you try to implement it in your org- then you find that only the alerting rules are provided in a coherent way. There's some lambdas in Python, some in Java and some in Node, but there's no package management for them or matching them up to the rules packs. No way to verify which packs you have installed or diff the rules between one and another. You'd need a full-on polyglot dev team to have a hope implementing those in your org! Having said that, the managed config rules are straightforward, complete and relatively easy to work with
-
Is there a tool to convert AWS Conformance Packs to Config Rules?
Conformance Packs are essentially lists of AWS Config Rules in yaml format (i.e. https://github.com/awslabs/aws-config-rules/blob/master/aws-config-conformance-packs/Operational-Best-Practices-for-NIST-800-171.yaml ), so it should be pretty easy to parse and convert to terraform. Just wondering if anyone knows of a tool that does this before I attempt it myself.
- Using AWS Config to get a list of all nonCMK for all services in use
-
AWS Control Tower factory-generated accounts - root user vs Guardrail?
We're working on that now, if anyone is interested in this, the code behind each compliance pack benchmark is on github, as well as for the remediations, when you're ready for that. So you just gotta bundle up your own StackSets of Config Rules and push 'em out.
-
One AWS account per developer?
Another problem I'm running into now is Security Hub benchmarks. To a certain extent, I'm okay with some 'risky' behavior in a sandbox, that's probably just a sign that the developer is learning/practicing something, however there's no good way to just enable the AWS Foundational Security Best Practices on just the Sandbox OU. I'm going to have to take their code and deploy it myself in a manner that suits our environment.
-
A note from our sponsor - SaaSHub
www.saashub.com | 9 May 2024
Stats
awslabs/aws-config-rules is an open source project licensed under Creative Commons Zero v1.0 Universal which is not an OSI approved license.
The primary programming language of aws-config-rules is Python.
Popular Comparisons
Sponsored