01Data protection checks for Cloud Storage encryption and bucket-level access
02Network boundary verification including VPC, firewall, and IAP configurations
03Identification of public resource exposures in Cloud Functions and Cloud SQL
04IAM policy auditing to eliminate primitive roles and enforce least privilege
05Ready-to-use secure Terraform patterns for GCP resource deployment
060 GitHub stars