Kinnaird McQuade's repositories
conftest-terraform-multifolder-policies
Example of how to write OPA rules with conftest in a modular fashion for Terraform 0.12 plans.
aws-workbox
A Vagrant box packed with some of my favorite AWS tools. Using for training others. Work in progress.
Cloud-Security-Research
Cloud-related research releases from the Rhino Security Labs team.
ansible
Ansible is a radically simple IT automation platform that makes your applications and systems easier to deploy. Avoid writing scripts or custom code to deploy and update your applications — automate in a language that approaches plain English, using SSH, with no agents to install on remote systems. https://docs.ansible.com/ansible/
ansible-role-logz-io
Ansible role to install logz.io shippers on a computer
aws-route-lab
Testing routing from one VPC to another via a Transit Gateway, then through an EC2 instance
aws_services_last_accessed
This Python solution reports the AWS services used by an AWS security principal (user, group, role) and writes the results to the Azure Monitor API for analysis
awspec
RSpec tests for your AWS resources.
conftest
Write tests against structured configuration data using the Rego query language
neo-hpstr-jekyll-theme
A Jekyll blog theme
opa
An open source, general-purpose policy engine.
opa-ci-sample
Sample code with OPA and CircleCI
policy-library-bucket-example
Fork of Forseti policy library to show how to create a constraint around bucket name using Rego
policyuniverse
Parse and Process AWS IAM Policies, Statements, ARNs, and wildcards.
swag-api
REST API and UI for SWAG data
terraform-archive-stable
Terraform module to create zip archives with stable hashes
terraform-aws-notify-slack
Terraform module which creates SNS topic and Lambda function which sends notifications to Slack
terraform-aws-secure-baseline
Terraform module to set up your AWS account with the secure baseline configuration based on CIS Amazon Web Services Foundations.
terraform-aws-vpc
Terraform module which creates VPC resources on AWS
terraform-deployment-pipeline
Repository containing a set of policies for aws resources created with terraform
terraform-neo4j
Terraform module to setup all resources needed for setting up a Neo4j cluster (enterprise).
terraform_aws_scp
AWS Organizations Service Control Policies (SCPs) in Terraform.
terraform_validate
Assists in the enforcement of user-defined standards in Terraform
vault
A tool for secrets management, encryption as a service, and privileged access management