Project Name | Stars | Downloads | Repos Using This | Packages Using This | Most Recent Commit | Total Releases | Latest Release | Open Issues | License | Language |
---|---|---|---|---|---|---|---|---|---|---|
Sops | 13,879 | 109 | 21 hours ago | 13 | May 09, 2022 | 372 | mpl-2.0 | Go | ||
Simple and flexible tool for managing secrets | ||||||||||
Prowler | 8,659 | 18 hours ago | 47 | August 03, 2023 | 19 | apache-2.0 | Python | |||
Prowler is an Open Source Security tool for AWS, Azure and GCP to perform Cloud Security best practices assessments, audits, incident response, compliance, continuous monitoring, hardening and forensics readiness. Includes CIS, NIST 800, NIST CSF, CISA, FedRAMP, PCI-DSS, GDPR, HIPAA, FFIEC, SOC2, GXP, Well-Architected Security, ENS and more. | ||||||||||
My Arsenal Of Aws Security Tools | 8,304 | 2 months ago | 1 | apache-2.0 | Shell | |||||
List of open source tools for AWS security: defensive, offensive, auditing, DFIR, etc. | ||||||||||
Devops Resources | 7,566 | 2 months ago | 14 | Groovy | ||||||
DevOps resources - Linux, Jenkins, AWS, SRE, Prometheus, Docker, Python, Ansible, Git, Kubernetes, Terraform, OpenStack, SQL, NoSQL, Azure, GCP | ||||||||||
Tfsec | 6,275 | 16 | a day ago | 405 | October 25, 2022 | 12 | mit | Go | ||
Security scanner for your Terraform code | ||||||||||
Scoutsuite | 5,673 | 4 days ago | 45 | September 05, 2022 | 188 | gpl-2.0 | Python | |||
Multi-Cloud Security Auditing Tool | ||||||||||
Cloudmapper | 5,620 | a month ago | 204 | bsd-3-clause | JavaScript | |||||
CloudMapper helps you analyze your Amazon Web Services (AWS) environments. | ||||||||||
Steampipe | 5,581 | 3 | 17 hours ago | 495 | July 31, 2023 | 104 | agpl-3.0 | Go | ||
Use SQL to instantly query your cloud services (AWS, Azure, GCP and more). Open source CLI. No DB required. | ||||||||||
Devsecops | 4,857 | 8 days ago | 4 | mit | ||||||
Ultimate DevSecOps library | ||||||||||
Security_monkey | 4,338 | 3 years ago | 1 | June 15, 2015 | 85 | apache-2.0 | Python | |||
Security Monkey monitors AWS, GCP, OpenStack, and GitHub orgs for assets and their changes over time. |
The Well-Architected framework has been developed to help cloud architects build the most secure, high-performing, resilient, and efficient infrastructure possible for their applications. This framework provides a consistent approach for customers and partners to evaluate architectures, and provides guidance to help implement designs that will scale with your application needs over time.
This repository contains documentation and code in the format of hands-on labs to help you learn, measure, and build using architectural best practices. The labs are categorized into levels, where 100 is introductory, 200/300 is intermediate and 400 is advanced.
Note |
---|
To run these AWS Well-Architected Labs, please go to: |
https://wellarchitectedlabs.com/ |
The labs cannot be run from GitHub. Please continue to use GitHub to log issues or make pull requests. To run the labs please use https://wellarchitectedlabs.com/
The labs are structured around the six pillars of the Well-Architected Framework:
Licensed under the Apache 2.0 and MITnoAttr License.
Copyright 2018-2019 Amazon.com, Inc. or its affiliates. All Rights Reserved.
Licensed under the Apache License, Version 2.0 (the "License"). You may not use this file except in compliance with the License. A copy of the License is located at
https://aws.amazon.com/apache2.0/
or in the "license" file accompanying this file. This file is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License.
You can deploy the site using deployment/walabs.yaml file. This file will deploy the site using AWS Amplify.
Once the site has been deployed, you must run the first build in the console. To do this, go to Amplify, select the App name, then click on "Run Build". All builds after this point will be continuous based on commits to the master branch.
Included in the CloudFormation deployment is a set of re-write rules to facilitate the migration from mkdocs to Hugo. These will automatically redirect to the new path based locations for each lab.
Because we needed an additional layer in front of the Amplify deployed Hugo site, we had to disable the L2_CACHE in Amplify. This allows for a secondary CloudFront distribution to be placed in front of the Amplify site (which you will use as the Origin for the CloudFront distribution).
Because we had an existing CloudFront distribution, the creation of setup of this was not included in the CloudFormation deployment.
hugo serve -D
The instructions below is how I built the skeleton site.