AWS CDK constructs come without added security configurations.
Project description
Very rarely this is validated during the CI pipeline via tools like CDK-NAG. The idea behind this project is to create secured constructs from the start.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Close
Hashes for cdk-opinionated-constructs-0.2.0.tar.gz
Algorithm | Hash digest | |
---|---|---|
SHA256 | 3181e5f08d462c857622bea21e9d07f3b38cedd3a810bcc4cc9f68f269cfa3e0 |
|
MD5 | d3ec792a37f48b18ad0f62c01801cba2 |
|
BLAKE2b-256 | 95fcadc727622ba580215a93a7c69d6f212c26fd904865853c04866ddb83f67f |
Close
Hashes for cdk_opinionated_constructs-0.2.0-py2.py3-none-any.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | cba2e9f083da8fa0de8e779a4fa1c0f6b3375b8e02c35ea4731be43665de59af |
|
MD5 | f6bf94e2b43135e8fedfe6d6435a94df |
|
BLAKE2b-256 | 3b0545aebb7f5699d2fd3945eaf22190697923f583a4cb0f2f4a852baa0521f8 |