Policy Sentry IAM Least Privilege Policy Generator Logo

Policy Sentry IAM Least Privilege Policy Generator

0
Free
Visit Website

Policy Sentry IAM Least Privilege Policy Generator Step 1: Create the Template Step 2: Copy/paste ARNs Step 3: Write-policy command Tutorial Installation Package managers Shell completion Step 1: Create the Template Step 2: Copy/paste ARNs Step 3: Write-policy command Cheat sheets Policy Writing cheat sheet IAM Database Query Cheat Sheet Local Initialization (Optional) Other Usage Commands Python Library usage Docker Terraform References Documentation For walkthroughs and full documentation, please visit the project on ReadTheDocs. See the Salesforce Engineering Blog post on Policy Sentry. Overview Writing security-conscious IAM Policies by hand can be very tedious and inefficient. Many Infrastructure as Code developers have experienced something like this: Determined to make your best effort to give users and roles the least amount of privilege you need to perform your duties, you spend way too much time combing through the AWS IAM Documentation on Actions, Resources, and Condition Keys for AWS Services. Your team lead encourages you to build security into your IAM Policies for product quality, but eventually you get frustrated due to project deadlines. You don't have an embedded security person on your team who can write those IAM Policies for you, and there

FEATURES

ALTERNATIVES

CredStash is a tool for managing and securely storing credentials.

Free

A tool for searching through public EBS snapshots for secrets, organized as an Elastic Beanstalk application.

Free

Tool for associating IAM roles to Pods in Kubernetes clusters.

Free

Find leaked credentials by scanning repositories for high entropy strings.

Free

Airlock Secure Access Hub is an integrated security platform that combines identity and access management with web application and API protection to secure digital applications while maintaining user experience.

Commercial

Encrypt Kubernetes Secrets into SealedSecrets for safe storage and controlled decryption within the cluster.

Free

A PHP OAuth 2.0 authorization server implementation with support for various grants and RFCs.

Free

A list of disposable email domains to detect or block disposable accounts

Free