GoogleCloudPlatform / security-analytics
Community Security Analytics provides a set of community-driven audit & threat queries for Google Cloud
☆340Updated 11 months ago
Alternatives and similar repositories for security-analytics
Users that are interested in security-analytics are comparing it to the libraries listed below
Sorting:
- Take automated actions against threats and vulnerabilities.☆214Updated last year
- Best practice example for secure and compliant Google Cloud Platform infrastructure☆104Updated 2 years ago
- Collection of example YARA-L rules for use within Google Security Operations☆394Updated this week
- GCP CIS 1.1.0 Benchmark InSpec Profile☆130Updated 9 months ago
- 🚨ATTENTION🚨 The Security Stack Mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is k…☆386Updated last year
- Built-in Panther detection rules and policies☆380Updated last week
- Dorothy is a tool to test security monitoring and detection for Okta environments☆182Updated 9 months ago
- A Cloud Security Posture Manager or CSPM with a focus on security analysis for the modern cloud stack and a focus on the emerging threat …☆187Updated 8 months ago
- ✨ A compilation of suggested tools/services for each component in a detection and response pipeline, along with real-world examples. The …☆278Updated last year
- ☆387Updated last year
- Open Cloud Security Posture Management Engine☆340Updated 3 years ago
- A curated list of resources about detecting threats and defending Kubernetes systems.☆381Updated last year
- Prisma Cloud docs☆81Updated last year
- Python library to carry out DFIR analysis on the Cloud☆477Updated last month
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆58Updated last year
- An open project to list all publicly known cloud vulnerabilities and CSP security issues☆342Updated this week
- ☆371Updated last year
- A cheatsheet containing AWS CloudTrail events that can be used for Incident Response purposes or Detection Engineering.☆73Updated last year
- ALFA stands for Automated Audit Log Forensic Analysis for Google Workspace. You can use this tool to acquire all Google Workspace audit l…☆162Updated 2 months ago
- A collection of GCP IAM privilege escalation methods documented by the Rhino Security Labs team.☆382Updated last year
- Threatest is a CLI and Go framework for end-to-end testing threat detection rules.☆329Updated 2 weeks ago
- ☆65Updated 11 months ago
- This GitHub page shows the CISO Tradecraft Podcast broken down by Topic☆123Updated 3 weeks ago
- Maturity models help integrate traditionally separate organizational functions, set process improvement goals and priorities, provide gui…☆233Updated last week
- ☆117Updated last month
- Cloud Commotion intends to cause chaos to simulate security incidents☆143Updated 10 months ago
- ☆367Updated last year
- JIT Groups is an open source application that lets you implement secure, self-service access management for Google Cloud using groups.☆266Updated this week
- A small set of scripts to summarize AWS Security Groups, and generate visualizations of the rules.☆62Updated 4 years ago
- Compares and analyzes GCP IAM roles.☆77Updated 2 months ago