aws-samples / amazon-security-lake-transformation-libraryLinks
☆19Updated last month
Alternatives and similar repositories for amazon-security-lake-transformation-library
Users that are interested in amazon-security-lake-transformation-library are comparing it to the libraries listed below
Sorting:
- AWS Security Analytics Bootstrap enables customers to perform security investigations on AWS service logs by providing an Amazon Athena a…☆254Updated this week
- A collection of projects supporting AWS Integration☆155Updated last week
- Automated Forensics Orchestrator for Amazon EC2 and EKS is a self-service AWS Guidance implementation that enterprise customers can deplo…☆65Updated last month
- Assisted Log Enabler for AWS - Find AWS resources that are not logging, and turn them on.☆263Updated this week
- Example AWS Service control policies to get started or mature your usage of AWS SCPs.☆250Updated last month
- ☆97Updated last year
- Example policies demonstrating how to implement a data perimeter on AWS.☆176Updated this week
- Automated Amazon GuardDuty Security Response☆28Updated 8 months ago
- Listing of resources for example AWS Service Control Policies (SCPs)☆17Updated last year
- ☆12Updated last year
- Uses the AWS Cloud Control API to list resources that are present in a given AWS account and region(s). Discovered resources are written …☆176Updated 3 months ago
- AWS CloudSaga - Simulate security events in AWS☆465Updated this week
- ☆139Updated 3 weeks ago
- This solutions facilitates rapid deployment of Prowler, full AWS Organization analysis, and finding processing as part of a security post…☆62Updated 3 months ago
- This repository provides sample templates for security playbooks against various scenarios when using Amazon Web Services.☆632Updated this week
- Crowdsourced list of sensitive IAM Actions☆154Updated 10 months ago
- ☆374Updated last year
- ☆48Updated 2 weeks ago
- ☆120Updated 3 months ago
- Generates runbooks for GuardDuty findings☆38Updated last year
- SCP management tool☆133Updated last year
- Runs IAM policy linting and security checks against either a single AWS account or multiple member accounts of an AWS Organization.☆146Updated 2 weeks ago
- ☆33Updated 6 months ago
- Analyzes CloudTrail data of a given AWS account and generates a summary of recently active IAM principals, API calls they made, as well a…☆164Updated 4 months ago
- Convert cloudtrail data to MITRE ATT&CK Sightings☆80Updated 3 years ago
- Tracker for Encryption by Default for AWS Resources☆14Updated 4 months ago
- Safer AWS SCP deployments via real-time monitoring☆55Updated last year
- Conversion of Okta System Log to OCSF project template☆12Updated 2 years ago
- An evolving repository of CloudTrail events with detailed descriptions, MITRE ATT&CK insights, real-world incidents, references and secur…☆165Updated 2 months ago
- List of known AWS accounts☆223Updated this week