AWS CDK constructs come without added security configurations.
Project description
Very rarely this is validated during the CI pipeline via tools like CDK-NAG. The idea behind this project is to create secured constructs from the start.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Close
Hashes for cdk-opinionated-constructs-1.12.0.tar.gz
Algorithm | Hash digest | |
---|---|---|
SHA256 | fe875ba7f6c1506e6568a41b6ca4276fdc71a3c96b2e0b30d3c1ee8a3132da70 |
|
MD5 | a298de026f7648ad10cd323783c8b128 |
|
BLAKE2b-256 | db37802d90eb7fb79cfb7e2f11fd2959fc2b97dadabbbe5355137a009aaf61e3 |
Close
Hashes for cdk_opinionated_constructs-1.12.0-py2.py3-none-any.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | 08e871b90d2589b81b3d610809f8422e257ed0cf867b5635856074ea19a30c99 |
|
MD5 | fcb45f5128d7d25a834010a297623ed5 |
|
BLAKE2b-256 | c289ba725cd359a4feca098d97b8431e2dfe00f49d618f09fb2d3b9fefc4f106 |