A terraform module to set up your AWS account with the reasonably secure configuration baseline. Most configurations are based on CIS Amazon Web Services Foundations v1.4.0 and AWS Foundational Security Best Practices v1.0.0. See Benchmark Compliance to check which items in various benchmarks are covered. Features: Identity and Access Management Set up IAM Password Policy. Create an IAM role for contacting AWS support for incident handling. Enable AWS Config rules to audit root account status. Enable IAM Access Analyzer in each region. Enable S3 account-level Public Access Block configuration. Logging & Monitoring Enable CloudTrail in all regions and deliver events to CloudWatch Logs. Object-level logging for all S3 buckets is enabled by default. CloudTrail Insights event logging is enabled by default. CloudTrail logs are encrypted using AWS Key Management Service. All logs are stored in the S3 bucket with access logging enabled. Logs are automatically archived into Amazon Glacier after the given period(defaults to 90 days). Set up CloudWatch alarms to notify you when critical changes happen in your AWS account. Enable AWS Config to monitor and enforce compliance with AWS security best practices.
FEATURES
SIMILAR TOOLS
A cloud native application protection platform that provides security monitoring and protection across cloud, on-premises, and hybrid environments.
CLI tool for deleting AWS resources in bulk with inspecting functionality.
Multi-account cloud security tool for AWS with real-time reporting and auto-remediation capabilities.
AWS Scout2 is a security tool for AWS administrators to assess their environment's security posture.
gVisor is an application kernel that provides isolation for running sandboxed containers.
A dynamic infrastructure framework for efficient multi-cloud security operations and distributed scanning.
A multi-threaded AWS security-focused inventory collection tool with comprehensive resource coverage and efficient data collection methods.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.