Skip to content
View angie-in-the-cloud's full-sized avatar

Block or report angie-in-the-cloud

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Popular repositories Loading

  1. secure-s3-bucket-cloudformation secure-s3-bucket-cloudformation Public

    A step-by-step guide for deploying a secure S3 bucket using AWS CloudFormation with AWS CLI

    4

  2. aws-security-hub-audit-ready-excel-reports aws-security-hub-audit-ready-excel-reports Public

    Automates AWS Security Hub findings into Excel reports with summaries and KPIs for GRC teams and auditors.

    2 1

  3. moto-aws-least-privilege-compliance-scanner moto-aws-least-privilege-compliance-scanner Public

    This lab uses Moto to mock AWS IAM and build a fully functional least-privilege policy analyzer without requiring a real AWS account

    Python 2

  4. aws-password-policy-compliance-checker aws-password-policy-compliance-checker Public

    A Python-based CLI tool that evaluates AWS IAM password policies for compliance with SOC 2 and NIST 800-53 security standards.

    Python 1

  5. aws-inactive-key-rotation aws-inactive-key-rotation Public

    This Python-based CLI tool is designed to analyze access keys for potential security risks and identifies keys that are old, unused, or non-compliant with best practices.

    Python 1

  6. policy-as-code-deny-public-s3-buckets-with-terraform-and-opa policy-as-code-deny-public-s3-buckets-with-terraform-and-opa Public

    Implement a Policy-as-Code control that automatically detects and blocks any S3 bucket policy granting public access before deployment.

    HCL 1