AWS CDK constructs come without added security configurations.
Project description
Very rarely this is validated during the CI pipeline via tools like CDK-NAG. The idea behind this project is to create secured constructs from the start.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Close
Hashes for cdk-opinionated-constructs-1.9.0.tar.gz
Algorithm | Hash digest | |
---|---|---|
SHA256 | 49ba62108dc02431f2581dfbd777875407cd28137bb87ce56799ea7eba46fcdb |
|
MD5 | f8a82c5d5bcf086ab2cd793b8c774601 |
|
BLAKE2b-256 | cf04cf073f1f63b37bae11f246c5acd96e9874335fe5b9f0a8da4724775d2193 |
Close
Hashes for cdk_opinionated_constructs-1.9.0-py2.py3-none-any.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | e3e40e0c0bcf621cde995aae4f7593f4e501c3133197ff20df7ae9c381454601 |
|
MD5 | 977fde1a6893c06827f69df78013ba4c |
|
BLAKE2b-256 | 9fd02892494aa9b99be956bff625b9c9025140a016ad597f9f572b1aaaeeae11 |