All Projects β†’ SSHcom β†’ c3

SSHcom / c3

Licence: MIT License
π—–πŸ― provides compliant AWS CDK components to various security standards.

Programming Languages

typescript
32286 projects
javascript
184084 projects - #8 most used programming language
Makefile
30231 projects

Projects that are alternatives of or similar to c3

devopsish.com
DevOps, Cloud Native, Hybrid Cloud, Open Source, industry news, culture, and the β€˜ish between.
Stars: ✭ 33 (+37.5%)
Mutual labels:  infrastructure, infrastructure-as-code
aws-cdk-go
AWS CDK bindings for Go.
Stars: ✭ 94 (+291.67%)
Mutual labels:  infrastructure-as-code, aws-cdk
netris-operator
The Kubernetes Operator for Netris
Stars: ✭ 28 (+16.67%)
Mutual labels:  infrastructure, infrastructure-as-code
Terrible
An Ansible playbook that apply the principle of the Infrastructure as Code on a QEMU/KVM environment.
Stars: ✭ 161 (+570.83%)
Mutual labels:  infrastructure, infrastructure-as-code
aws-cdk-starter
No description or website provided.
Stars: ✭ 31 (+29.17%)
Mutual labels:  infrastructure-as-code, aws-cdk
Pulumi Aws
An Amazon Web Services (AWS) Pulumi resource package, providing multi-language access to AWS
Stars: ✭ 169 (+604.17%)
Mutual labels:  infrastructure, infrastructure-as-code
iabtcf-es
Official compliant tool suite for implementing the Transparency and Consent Framework (TCF) v2.0. The essential toolkit for CMPs.
Stars: ✭ 102 (+325%)
Mutual labels:  gdpr, gdpr-compliant
Toc
A Table of Contents of all Gruntwork Code
Stars: ✭ 111 (+362.5%)
Mutual labels:  infrastructure, infrastructure-as-code
stein
A linter for config files with a customizable rule set
Stars: ✭ 92 (+283.33%)
Mutual labels:  infrastructure, infrastructure-as-code
terraform-pb
Programmatic management of infrastructure using Terraform and Protocol Buffers
Stars: ✭ 18 (-25%)
Mutual labels:  infrastructure, infrastructure-as-code
Terraform Aws Landing Zone
Terraform Module for AWS Landing Zone
Stars: ✭ 142 (+491.67%)
Mutual labels:  infrastructure, infrastructure-as-code
cdk-collections
AWS Infra as Code(akka. AWS CDK) example collections
Stars: ✭ 19 (-20.83%)
Mutual labels:  infrastructure-as-code, aws-cdk
Terraform With Circleci Example
This is an example of automatic deployments of your infrastructure using terraform and CircleCI 2.0 workflows
Stars: ✭ 142 (+491.67%)
Mutual labels:  infrastructure, infrastructure-as-code
Fogg
Manage Infrastructure as Code with less pain.
Stars: ✭ 181 (+654.17%)
Mutual labels:  infrastructure, infrastructure-as-code
Terrascan
Detect compliance and security violations across Infrastructure as Code to mitigate risk before provisioning cloud native infrastructure.
Stars: ✭ 2,687 (+11095.83%)
Mutual labels:  infrastructure, infrastructure-as-code
terraform-templates
Terraform templates, examples, etc.
Stars: ✭ 16 (-33.33%)
Mutual labels:  infrastructure, infrastructure-as-code
Itamae
Configuration management tool inspired by Chef, but simpler and lightweight. Formerly known as Lightchef.
Stars: ✭ 1,014 (+4125%)
Mutual labels:  infrastructure, infrastructure-as-code
Cintodeutilidadesdocker
My Docker templates repository 🐳 ☁️ 🐳
Stars: ✭ 74 (+208.33%)
Mutual labels:  infrastructure, infrastructure-as-code
terraform-aws-concourse
Terraform Module for a distributed concourse cluster on AWS
Stars: ✭ 12 (-50%)
Mutual labels:  infrastructure, infrastructure-as-code
POSH-HPEOneView
PowerShell language bindings library for HPE OneView.
Stars: ✭ 116 (+383.33%)
Mutual labels:  infrastructure, infrastructure-as-code

π—–πŸ―: Compliant Cloud Components

The library π—–πŸ― provides configuration to AWS CDK components which is compliant with CIS, GDPR and other security standards.

Build Status Coverage Status

Inspiration

Cyber-security address various threats with data loses thefts, breaches and violation of privacy. Fortunately, we have a group of security experts who looks after these threats. They have developed controls and benchmark protocols to address these challenges. Often, usage of the tools requires a special effort and domain knowledge from software engineers. This library helps AWS cloud developers with controls defined by:

Please find details about supported controls in the checklists

Getting Started

The latest version of the library is available at master branch of the repository. All development, including new features and bug fixes, take place on the master branch using forking and pull requests as described in contribution guidelines.

npm install --save @ssh.com/c3

The library acts as an overlay for existing AWS CDK components. It aims to minimize effort required to enable compliancy with privacy and security best practices. For example:

//
// Your CDK application creates S3 bucket
import * as s3 from '@aws-cdk/aws-s3'

new s3.Bucket(stack, 'MyS3', /* ... */)

//
// It is easy to enable its encryption and disable public access,
// hence making it compliant with GDPR-25 and GDPR-32 1.a.
// 
// Just make following changes:
import * as c3 from '@ssh.com/c3'

const kmsKey = c3.kms.fromAlias(stack, 'alias/MyKey')
new c3.s3.Bucket(stack, 'MyS3', { kmsKey, /* ... */ })

Please notice that each component enforces encryption and requires mandatory kmsKey: kms.IAlias parameter. The KMS Alias is used intentionally to allow flexibility on key management. We do also recommend to create and use key from different stacks. It prevents accidental deletion of key while you dispose an application. See more about KMS key design at π—–πŸ― library here.

//
// Stack A
new c3.kms.SymmetricKey(stack, 'MyKey')

// 
// Stack B
const kmsKey = c3.kms.fromAlias(stack, 'alias/MyKey')

The library support following components, we are actively seeking for contribution. Please see an example about usage of components:

import * as c3 from '@ssh.com/c3'

const stack = new cdk.Stack()
new c3.kms.SymmetricKey(stack, 'MyKey')
new c3.logs.LogGroup(stack, 'MyLogs', /* ... */)
new c3.efs.FileSystem(stack, 'MyEFS', /* ... */)
new c3.rds.DatabaseInstance(stack, 'MyRDS', /* ... */)
new c3.dynamodb.Table(stack, 'MyTable', /* ... */)
new c3.s3.Bucket(stack, 'MyS3', /* ... */)
new c3.codebuild.Project(stack, 'MyCodeBuild', /* ... */)
new c3.secretsmanager.Secret(stack, 'MySecret', /* ... */)

How To Contribute

The project is MIT licensed and accepts contributions via GitHub pull requests:

  1. Fork it
  2. Create your feature branch (git checkout -b my-new-feature)
  3. Commit your changes (git commit -am 'Added some feature')
  4. Tag each commit with control id ((CIS-2.8) ...)
  5. Push to the branch (git push origin my-new-feature)
  6. Create new Pull Request

The development requires TypeScript and AWS CDK

npm install -g typescript ts-node aws-cdk
git clone https://github.com/SSHcom/c3
cd c3

npm install
npm run build
npm run test
npm run lint

License

See LICENSE

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].