AWS CDK constructs come without added security configurations.
Project description
Very rarely this is validated during the CI pipeline via tools like CDK-NAG. The idea behind this project is to create secured constructs from the start.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Close
Hashes for cdk-opinionated-constructs-1.3.2.tar.gz
Algorithm | Hash digest | |
---|---|---|
SHA256 | 28a5a82af528ac6ec0bc973204571f916ff3c9c048483cd63a2614ff47008cd5 |
|
MD5 | d47eb06dbaa80cfe1ee3d627c5a971c4 |
|
BLAKE2b-256 | 3a2588c06ebdbbef89fa0ec377351a845a6a82ea2a0ff6e689d68282b9d43d63 |
Close
Hashes for cdk_opinionated_constructs-1.3.2-py2.py3-none-any.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | cb50adc9ff7054d544ef988264b89a66eade2c40f30d1ab82c04cb63b1caa42b |
|
MD5 | 556d7f5d50fbc5d244b2062d4fd57893 |
|
BLAKE2b-256 | 8a5543f5900376047647e810ff4de89600b50fca1673b31ba0e62e01bd5554aa |