AWS CDK constructs come without added security configurations.
Project description
Very rarely this is validated during the CI pipeline via tools like CDK-NAG. The idea behind this project is to create secured constructs from the start.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Close
Hashes for cdk-opinionated-constructs-1.5.0.tar.gz
Algorithm | Hash digest | |
---|---|---|
SHA256 | fcb120be5d36ac64b800c0b506d30706e80bacabdf19a5ed6fbead85ae773404 |
|
MD5 | 417630e48f9fc9b81c215463abd3ee6e |
|
BLAKE2b-256 | 2044b54eba9e1d3f77f49705ec004bc50f65e1f45e22156dfd1c03e9afa1fcd3 |
Close
Hashes for cdk_opinionated_constructs-1.5.0-py2.py3-none-any.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | 7305a8ba43122bc7345e77261d1f111ab97768eae479851637bb91eea42c4cc4 |
|
MD5 | c181d989f0974ae82efceb866b364c77 |
|
BLAKE2b-256 | 1f73ada883a5cbab6f2f7c97a282a96d4069f86626694cadb2a1fcc15d77c8bc |