AWS CDK constructs come without added security configurations.
Project description
Very rarely this is validated during the CI pipeline via tools like CDK-NAG. The idea behind this project is to create secured constructs from the start.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Close
Hashes for cdk-opinionated-constructs-1.4.0.tar.gz
Algorithm | Hash digest | |
---|---|---|
SHA256 | 33d505f9f1ba61564003b73ac77485c242d019a4e81578420a54f75d60211bae |
|
MD5 | 5c60776b4342f44b06910e51678fab88 |
|
BLAKE2b-256 | 2a318b8945436cd2e66df4e0b2856d9bf631a20f7aa57a16dacc1cd7d95e0786 |
Close
Hashes for cdk_opinionated_constructs-1.4.0-py2.py3-none-any.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | 4a624762a97b2107572cf9e03c5055b3951b3fb48651e215701a6129e5ca0aab |
|
MD5 | 5752cea5b7915c7a68662c66da7e74fe |
|
BLAKE2b-256 | ce14013433439a6acdbb9c79e8b728ee21737f3bd04a0f887dd82eab936ef1c2 |