A command-line interface tool designed for generating AWS IAM policy documents, SAM policy templates, and SAM Connectors. The tool operates based on JSON definitions used in the AWS Policy Generator, providing a programmatic approach to IAM policy creation. The CLI accepts optional SAM or CloudFormation templates as input, enabling users to reference resource ARNs through intrinsic functions for resources defined within those templates. The tool incorporates a mapping system that correlates CloudFormation resource types to their corresponding intrinsic functions that return ARNs, utilizing the cfn-lint schema for the us-east-1 region. Version 1.0.5 introduced support for AWS::Serverless::Connectors, expanding the tool's capabilities for serverless applications. When provided with a SAM template, the tool can identify connectable resources and assist in generating AWS::Serverless::Connector resources, facilitating the establishment of secure connections between serverless components. The tool streamlines the process of creating IAM policies by automating the generation of policy documents while maintaining compatibility with existing AWS infrastructure-as-code practices.
FEATURES
SIMILAR TOOLS
A search engine for open Amazon S3 buckets and their contents, allowing users to search for files using keywords, filename extensions, and full path.
HAWK is a multi-cloud antivirus scanning API that uses CLAMAV and YARA engines to detect malware in AWS S3, Azure Blob Storage, and GCP Cloud Storage objects.
A deprecated Kubernetes workload policy enforcement tool that helped secure multi-tenant clusters through various security policies and configurations.
A framework for analyzing container images, running scripts inside containers, and gathering information for static analysis and policy enforcement.
A tutorial demonstrating how to implement Kubernetes Engine security features to control application privileges through host access controls and network access policies.
FestIn discovers open S3 buckets associated with a domain using crawling and DNS reconnaissance techniques.
Collection of Kubernetes manifests creating pods with elevated privileges for security testing.
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.
KICS is an open-source Infrastructure as Code security scanner that detects vulnerabilities and misconfigurations through customizable queries and integrates with CI/CD pipelines.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.