π‘οΈ aws-safe-module
Secure-by-default, opinionated CDKTF modules for AWS infrastructure
π Overview
aws-safe-module is a library of opinionated, compliant-by-default wrappers for CDK for Terraform (CDKTF) using the AWS provider. It helps you bootstrap infrastructure with guardrails, best practices, and consistency built-in β so teams can move fast without breaking things.
β
Key Features
- π Security First β Encryption, logging, and least-privilege IAM are default, not optional.
- π§ Opinionated Setup β Enforces naming conventions, tagging, and architectural standards.
- π¦ Reusable Modules β Prebuilt secure components like S3, VPCs, IAM roles, and more.
- π Compliant-by-Design β Every module bakes in practices aligned with modern compliance requirements (SOC2, HIPAA, GxP, etc.).
- π§± Extensible β Override or extend modules while preserving core guarantees.
π¦ Installation
Install via npm:
npm install @sheplu/aws-safe-module
Or with yarn:
yarn add @sheplu/aws-safe-module
π§ Philosophy
Too often, cloud infra suffers from:
- πͺ Inconsistent naming and tagging
- π Insecure defaults
- π§© Copy-pasted patterns and snowflake setups
- π Hard-to-measure compliance
aws-safe-module solves this by defining battle-tested defaults and enforcing standards across teams β enabling scalable, secure cloud infrastructure without friction.
π§ Configuration Principles
Every module is built to:
- Use opinionated defaults, customizable with overrides
- Enforce naming patterns (e.g., project-env-resource)
- Require or auto-inject standard tags (name, env, team)
- Deny public access unless explicitly allowed
- Be easy to integrate into existing CDKTF workflows
π§ Built For
- Platform engineers creating reusable cloud components
- Dev teams who want secure infra without deep AWS expertise
- Organizations enforcing consistency, compliance, and velocity