AWS CDK constructs come without added security configurations.
Project description
Very rarely this is validated during the CI pipeline via tools like CDK-NAG. The idea behind this project is to create secured constructs from the start.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Close
Hashes for cdk-opinionated-constructs-0.3.0.tar.gz
Algorithm | Hash digest | |
---|---|---|
SHA256 | cff63067b9c11922cdbbeb9393bdb50a59e48575a07e0108e85bcb3fe886a5b6 |
|
MD5 | ad3d2d2330995d0b5a41bbe768677602 |
|
BLAKE2b-256 | 5f17aace859151ca6d6461f6897a29e3ec4a8f76c837fb202cd5b351fe6714d1 |
Close
Hashes for cdk_opinionated_constructs-0.3.0-py2.py3-none-any.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | a764f3a773cd68d48d294334d9f09ba1937514d2727f44b2ca420cf7986451ee |
|
MD5 | de89f7504feec3afeedfc4ced2997c59 |
|
BLAKE2b-256 | d842894ded83e844100909ea1926f863d81a1497de1713572bd4b45f16ee2f5c |