GoogleCloudPlatform / security-analytics
Community Security Analytics provides a set of community-driven audit & threat queries for Google Cloud
☆335Updated 9 months ago
Alternatives and similar repositories for security-analytics:
Users that are interested in security-analytics are comparing it to the libraries listed below
- Take automated actions against threats and vulnerabilities.☆213Updated last year
- Best practice example for secure and compliant Google Cloud Platform infrastructure☆104Updated 2 years ago
- Collection of example YARA-L rules for use within Google Security Operations☆368Updated last week
- GCP CIS 1.1.0 Benchmark InSpec Profile☆130Updated 7 months ago
- 🚨ATTENTION🚨 The Security Stack Mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is k…☆383Updated 11 months ago
- Built-in Panther detection rules and policies☆369Updated this week
- A curated list of resources about detecting threats and defending Kubernetes systems.☆376Updated last year
- Command line tool to interact with Chronicle's Config Based Normalizer (CBN) APIs.☆28Updated last year
- ✨ A compilation of suggested tools/services for each component in a detection and response pipeline, along with real-world examples. The …☆273Updated last year
- ☆81Updated last year
- A library of constraint templates and sample constraints for Constraint Framework tools☆226Updated 9 months ago
- JIT Groups is an open source application that lets you implement secure, self-service access management for Google Cloud using groups.☆262Updated this week
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆58Updated last year
- Python library to carry out DFIR analysis on the Cloud☆474Updated 2 months ago
- Python samples and utilities for Chronicle APIs☆81Updated last week
- Prisma Cloud docs☆79Updated 11 months ago
- A collection of GCP IAM privilege escalation methods documented by the Rhino Security Labs team.☆376Updated 11 months ago
- Terraform provider for Prisma Cloud Compute☆25Updated this week
- Maturity models help integrate traditionally separate organizational functions, set process improvement goals and priorities, provide gui…☆225Updated this week
- ☆371Updated last year
- This is a collection of threat detection rules / rules engines that I have come across.☆283Updated 10 months ago
- Cloud Commotion intends to cause chaos to simulate security incidents☆145Updated 9 months ago
- ☆364Updated 11 months ago
- ☆112Updated 2 months ago
- KaiMonkey provides vulnerable infrastructure as code (IaC) to help explore and understand common cloud security threats exposed via IaC.☆98Updated last year
- Compares and analyzes GCP IAM roles.☆77Updated 2 weeks ago
- An open project to list all publicly known cloud vulnerabilities and CSP security issues☆326Updated this week
- Deploy Google Cloud log export to Splunk using Terraform☆44Updated 10 months ago
- Threatest is a CLI and Go framework for end-to-end testing threat detection rules.☆328Updated last year
- Dorothy is a tool to test security monitoring and detection for Okta environments☆179Updated 7 months ago