andedevsecops / AWS-Security-Hub-Data-Connector
☆10Updated 3 years ago
Alternatives and similar repositories for AWS-Security-Hub-Data-Connector:
Users that are interested in AWS-Security-Hub-Data-Connector are comparing it to the libraries listed below
- ☆88Updated last year
- Automated Forensics Orchestrator for Amazon EC2 is a self-service AWS Solution implementation that enterprise customers can deploy to qui…☆59Updated 2 months ago
- This solutions facilitates rapid deployment of Prowler, full AWS Organization analysis, and finding processing as part of a security post…☆54Updated 2 months ago
- Generates runbooks for GuardDuty findings☆35Updated 7 months ago
- ThreatModel for Amazon S3 - Library of all the attack scenarios on Amazon S3, and how to mitigate them following a risk-based approach☆150Updated last year
- AWSATT&CK adds MITRE ATT&CK context and additional logging capabilities to Rhino Security Labs's open-source AWS exploitation framework, …☆45Updated 3 years ago
- AWS Security Analytics Bootstrap enables customers to perform security investigations on AWS service logs by providing an Amazon Athena a…☆246Updated this week
- ☆115Updated last month
- A cheatsheet containing AWS CloudTrail events that can be used for Incident Response purposes or Detection Engineering.☆67Updated 9 months ago
- Pre-configured response & remediation playbooks for AWS Security Hub☆65Updated 3 years ago
- Mindmaps about AWS based on public information☆132Updated 2 years ago
- Hands-on workshop on how to build security automation in pipelines☆37Updated 9 months ago
- ☆33Updated 8 months ago
- A tool to keep AWS pentests and red teams efficient, organized, and stealthy.☆89Updated 11 months ago
- Automated Amazon GuardDuty Security Response☆27Updated last month
- This repository contains the research and components of our research into using Sigma for AWS Incident Response.☆27Updated last year
- Example AWS Service control policies to get started or mature your usage of AWS SCPs.☆232Updated last week
- This implementation demonstrates the AWS Identity and Access Management (IAM) Access Analyzer policy validation capability. Learn how to …☆24Updated 2 years ago
- A Lambda function for Resource Tagging Automation☆50Updated 6 months ago
- ☆20Updated last year
- Convert cloudtrail data to MITRE ATT&CK Sightings☆79Updated 2 years ago
- A guide to simplify the process of evaluating Datadog's Cloud SIEM security capabilities to detect AWS threats.☆18Updated last year
- Sample DevSecOps pipelines (heavily biased on the "Sec") for various stacks and tools using open-source security tools and AWS native ser…☆67Updated 3 years ago
- Assisted Log Enabler for AWS - Find AWS resources that are not logging, and turn them on.☆245Updated this week
- ☆12Updated last year
- Learning Activities for the AWS Security Specialty Course☆82Updated 5 years ago
- Tracker for Encryption by Default for AWS Resources☆13Updated 2 months ago
- Create a Neo4J graph of users and roles trust policies within an AWS Organization.☆26Updated last year
- A MITRE ATT&CK Navigator export for AWS GuardDuty Findings☆137Updated 3 years ago
- ☆38Updated last year