SumoLogic / sumologic-contentLinks
Welcome to Sumo Logic's Community Content Repository!
☆110Updated last month
Alternatives and similar repositories for sumologic-content
Users that are interested in sumologic-content are comparing it to the libraries listed below
Sorting:
- ☆37Updated 5 years ago
- Python installable command line utiltity for mitigation of host and key compromises.☆347Updated 4 years ago
- InSpec profile to validate your VPC to the standards of the CIS Amazon Web Services Foundations Benchmark☆77Updated 3 months ago
- A GUI utility for performing Sumo Logic API tasks that would otherwise require scripting☆36Updated 4 years ago
- Remote Memory Acquisition Tool☆251Updated 5 years ago
- Dow Jones Hammer : Protect the cloud with the power of the cloud(AWS)☆445Updated 2 years ago
- Example detection of compromise credentials in AWS☆122Updated 7 years ago
- ☆97Updated 2 years ago
- AWS Inventory and Compliance Framework☆225Updated 2 years ago
- AWS Identity and Access Management Visualizer and Anomaly Finder☆297Updated last year
- Blazing CloudTrail since 2018☆138Updated 6 years ago
- ☆375Updated last year
- The SOCless automation framework☆140Updated 9 months ago
- A set of handy tools to make it easier for Operations teams to run to Trend Micro Deep Security.☆43Updated 3 years ago
- A small set of scripts to summarize AWS Security Groups, and generate visualizations of the rules.☆63Updated 5 years ago
- A python module for orchestrating content acquisitions and analysis via amazon ssm.☆58Updated 2 years ago
- A collection of projects supporting AWS Integration☆156Updated 2 months ago
- Code examples for the AWS Security Blog post: How to use CI/CD to deploy and configure AWS security services with Terraform☆97Updated 4 years ago
- A small lambda script that will disable access keys older than a given amount of days.☆153Updated 2 years ago
- ☆157Updated 2 years ago
- Automation of VPC Traffic Mirror Sessions in AWS☆35Updated last week
- List of vendors that do not allow IMDSv2 enforcement☆143Updated last year
- SkyWrapper helps to discover suspicious creation forms and uses of temporary tokens in AWS☆108Updated 4 years ago
- Terraform stack to deploy ELK Threat Hunting on Amazon AWS.☆89Updated 6 years ago
- Wazuh - Amazon AWS Cloudformation☆41Updated 2 years ago
- A honey token manager and alert system for AWS.☆321Updated 3 years ago
- Framework for reviewing and responding to events in AWS Flow Logs using Lambda Function☆46Updated 4 months ago
- Incident Response and Forensic on AWS☆20Updated 5 years ago
- This command line tool counts the number of resources in different categories across Amazon regions.☆59Updated 5 years ago
- Open Cloud Security Posture Management Engine☆342Updated 3 years ago