AWS CDK constructs come without added security configurations.
Project description
Very rarely this is validated during the CI pipeline via tools like CDK-NAG. The idea behind this project is to create secured constructs from the start.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Close
Hashes for cdk-opinionated-constructs-1.14.0.tar.gz
Algorithm | Hash digest | |
---|---|---|
SHA256 | 35c503cd706514f3b4ed28228b2e376b326f0b1e60e67092173620259ae63a86 |
|
MD5 | b593c11bd1ae958f3ac37e2f54edc503 |
|
BLAKE2b-256 | 825aaf4f9403ecc7eeda94ce9c0286005f51f8ed359428e46fad3eeaaa885924 |
Close
Hashes for cdk_opinionated_constructs-1.14.0-py2.py3-none-any.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | 510c500b8139eb4f15bd2fef2a4a3f8cc50b16d39e9f7c608597cb0fdcb2eb13 |
|
MD5 | f4998819f2450459b25d8ffdfb815f78 |
|
BLAKE2b-256 | 1ff000c7f610d296a0d0812c30bcf1c299fb457a21fabf6bfdacec711395205f |