PaloAltoNetworks / evident-custom-signatures
Evident Security Platform Custom Signatures Samples
☆28Updated 5 years ago
Alternatives and similar repositories for evident-custom-signatures:
Users that are interested in evident-custom-signatures are comparing it to the libraries listed below
- Checks AWS CloudFormation templates for security, reliability and conformity☆43Updated 4 years ago
- DEPRECATED — Self Service AWS IAM Policies for dev at scale☆58Updated 9 years ago
- Cloud multi-account metadata management tool.☆88Updated 4 years ago
- AWS risky security change detector based on EDDA.☆82Updated 6 years ago
- A serverless, event-driven AWS configuration collection service with configuration versioning.☆93Updated 4 years ago
- Framework for reviewing and responding to events in AWS Flow Logs using Lambda Function☆46Updated last year
- Cloud Auxiliary is a python wrapper and orchestration module for interacting with cloud providers☆76Updated 2 years ago
- [WORK IN PROGRESS] A repo containing rule sets for cloud-custodian inside GSA AWS accounts. This repo does not contain cloud-custodian it…☆29Updated 7 years ago
- Audit reporting: collect violations across all AWS accounts☆40Updated 6 years ago
- Dump and load your AWS IAM configuration into text files☆48Updated last year
- Enhance the security of the EC2 metadata service. (Obsolete thanks to Instance Metadata Service Version 2, see note in README)☆31Updated 5 years ago
- Ansible playbook for deploying CIS Security Benchmarks to system(s) running Ubuntu 14.04☆43Updated 8 years ago
- This CloudWatch Events rule Lambda function evaluates AWS API calls that change Amazon EC2 security group ingress rules. The function fla…☆25Updated 5 years ago
- Automate the AWS GuardDuty account invitation lifecycle for all of your organizations AWS accounts in all regions as well as aggregate an…☆66Updated last year
- AWS CIS Benchmark scanner☆39Updated 7 years ago
- Lambda job in Python to automatically patch EC2 instances when an inspector assessment generates a CVE finding☆58Updated 6 years ago
- Dump your EC2 Security Groups as a CSV or JSON file☆70Updated last year
- Blazing CloudTrail since 2018☆136Updated 6 years ago
- Notifies slack when an IAM policy is created, changed or assigned to a role☆33Updated 3 years ago
- Lambda job in Python to automatically deploy Inspector agent to newly-launched EC2 instances☆28Updated 6 years ago
- Show the history and changes between configuration versions of AWS resources☆70Updated 5 years ago
- A visualizer of the network of security group dependencies in an AWS VPC.☆84Updated 4 years ago
- Creates a CloudFormation stack for running Security Monkey☆27Updated 5 years ago
- Marking instances dirty since 2018☆47Updated 5 years ago
- 🔐💥 KeyNuker - nuke AWS keys accidentally leaked to Github☆90Updated 6 years ago
- CloudTrail and CloudWatch configuration with some basic security alarms.☆18Updated 7 years ago
- Python scripts to run in AWS Lambda to process findings from Amazon Inspector☆39Updated 6 years ago
- Sample code to append additional information (e.g. Security Group IDs and geolocation data) to VPC Flow Logs for analysis in Elasticsearc…☆86Updated 4 years ago
- Building Operational Visibility Into (n) Environments☆69Updated 6 years ago
- A small lambda script that will disable access keys older than a given amount of days.☆152Updated 2 years ago