guardrails-samples
guardrails-samples copied to clipboard
Provides teams using Turbot Guardrails automation and configuration-as-code examples for effective management of Guardrails for their organization.
**Control objective** Real time alerts for any local users are created and access keys not rotated. **Remediation** - Destroy unapproved IAM users. - Destroy access keys over a certain age....
- Covers the policy settings described by the "Decommission AWS Account" docs: https://turbot.com/guardrails/docs/integrations/aws/decommission
**Control objective*** Remove Principal:* from SQS Policies **Remediation** Remove the offending policy statement. **Categories** - Access Management **Additional context** ZD: 6583
**Control objective*** A set of policy settings to remove Guardrails-managed resources from an AWS Account. This is independent of CMDB policy settings to cut down the number of resources in...
- Useful for enterprise customers who are using custom VPCs. - This CFN serves as a convenient starting point for what ports are required and the Guardrails security group naming...
**Control objective*** Add Active and Active > Age policy settings to the [Enforce AWS VPC Elastic IPs to Not Be Unassociated](https://hub.guardrails.turbot.com/policy-packs/aws_vpc_enforce_elastic_ips_to_not_be_unassociated) policy pack. At present, the PP only cleans up...
### Updated - [x] Azure > Cosmos DB > Database Account - Enforce Azure Cosmos DB Database Accounts to be Accessible to Selected Networks - [x] Azure > Cosmos DB...