Join Slack
Powered by
This message was deleted.
# general
s
Slackbot
05/19/2022, 1:47 PM
This message was deleted.
👍 2
h
Hamza Faouri
05/19/2022, 2:27 PM
here is an idea if you’re on AWS
https://aws.amazon.com/blogs/security/iam-access-analyzer-makes-it-easier-to-impleme[…]missions-by-generating-iam-policies-based-on-access-activity/
c
Colin Watts
05/19/2022, 2:27 PM
yes, I should’ve mentioned that we’re using AWS. Thanks, I’ll check that out 👍
👍 1
l
Liam Baker
05/19/2022, 5:54 PM
Have been using this for multi-account scenarios with success
https://github.com/salesforce/cloudsplaining
and
for the “shift left” side of things, evaluating policy documents in CI with
https://github.com/duo-labs/parliament
(if it helps!)
c
Colin Watts
05/19/2022, 6:12 PM
Thanks for sharing,
@Liam Baker
- I’ll be sure to check those out too 👍
b
Billy Fisher
05/22/2022, 7:56 PM
This reminds me of
https://www.openpolicyagent.org
, which can be integrated into terraform by scanning against the JSON.
✔️ 1
c
Colin Watts
05/23/2022, 9:53 AM
looks like another great option, thanks
@Billy Fisher
👍
45
Views
Open in Slack
Previous
Next