AWS CDK constructs come without added security configurations.
Project description
Very rarely this is validated during the CI pipeline via tools like CDK-NAG. The idea behind this project is to create secured constructs from the start.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Close
Hashes for cdk-opinionated-constructs-1.7.0.tar.gz
Algorithm | Hash digest | |
---|---|---|
SHA256 | 36b6b3def9b3bdcde206c21cbc0f2d8e7945f76a14b217a5c1fb8c7f405df69f |
|
MD5 | 8fc8dc7fde8a5bd3957a413f14e94c43 |
|
BLAKE2b-256 | 1ecf9a96b164de1c5686b7d1d1a4181dcb57d29f5e2996cea469e74d2027cf7a |
Close
Hashes for cdk_opinionated_constructs-1.7.0-py2.py3-none-any.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | 74e69025addd5e940f8ffad5ae39f57e7078697d95915ca4a16735e83e604945 |
|
MD5 | c0f68571149b63c7acddb4582fd675ed |
|
BLAKE2b-256 | dfd2c9dbfc7fdca7689871598ae0128c25b0bde25613346dec115ff36bc8e67f |