AWS CDK constructs come without added security configurations.
Project description
Very rarely this is validated during the CI pipeline via tools like CDK-NAG. The idea behind this project is to create secured constructs from the start.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Close
Hashes for cdk-opinionated-constructs-1.8.0.tar.gz
Algorithm | Hash digest | |
---|---|---|
SHA256 | 97d4b0fb2ca69bf5427a7a841959ea8ef43ca73bf92f015f778947ab5310bf66 |
|
MD5 | 03e47c5cd1a2a2bb88da2741ab83b2da |
|
BLAKE2b-256 | 919b6025687b801437008e8dc07ec8d45a38358ccaf2fdb50ccd927c23cd5b65 |
Close
Hashes for cdk_opinionated_constructs-1.8.0-py2.py3-none-any.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | 06153e9b452e6fbecfb06a69e43210c9c58b87b09840314194e0256e90003269 |
|
MD5 | bd6cd244f644ff8763c02be2f504172f |
|
BLAKE2b-256 | d734ec229ba0ec5099f68a2735c58e5c983aac20459d285e01e328763bc1df44 |