☆27Aug 11, 2020Updated 5 years ago
Alternatives and similar repositories for automated-incident-response-with-ssm
Users that are interested in automated-incident-response-with-ssm are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The purpose this solution provides is automated notifications for how many passed, not passed, failed, and warning findings for each memb…☆10Dec 5, 2022Updated 3 years ago
- ☆22May 11, 2022Updated 3 years ago
- ☆43Apr 5, 2025Updated 11 months ago
- ☆18Feb 17, 2025Updated last year
- The objective of Cloud Builders' Day repository is to provide do-it-yourself lab guides for several AWS services including but not limite…☆11Aug 20, 2020Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- This repository contains the research and components of our research into using Sigma for AWS Incident Response.☆31Jul 12, 2023Updated 2 years ago
- Incident Response and Forensic on AWS☆20May 19, 2020Updated 5 years ago
- Automated Amazon GuardDuty Security Response☆29Dec 23, 2024Updated last year
- This example shows how you can create a Lambda function to retrieve inventory information to create the integrated inventory spreadsheet …☆28Sep 20, 2024Updated last year
- ☆13Jan 16, 2021Updated 5 years ago
- ☆12Dec 8, 2021Updated 4 years ago
- Make AWS IAM policies smaller by adding wildcards to actions.☆19Mar 22, 2026Updated last week
- Varna: Quick & Cheap AWS CloudTrail Monitoring with Event Query Language (EQL)☆52Dec 26, 2022Updated 3 years ago
- ☆375Feb 23, 2024Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A CLI that utilizes Okta IdP via SAML to acquire temporary AWS credentials☆10Jun 30, 2021Updated 4 years ago
- Accelerate AWS IAM Identity Center (successor to AWS Single Sign-On (SSO)) implementation using AWS CDK. This CDK program allows you to c…☆36Jan 19, 2023Updated 3 years ago
- Proof of concept incident response demo using SSM and AWS Fargate.☆14Dec 5, 2019Updated 6 years ago
- (WIP) A terraform / kitchen-terraform hardening baseline for the cis-aws-foundations-baseline☆24Dec 14, 2025Updated 3 months ago
- Threat Response API Module☆10Oct 4, 2023Updated 2 years ago
- ☆25Oct 17, 2023Updated 2 years ago
- Automation of VPC Traffic Mirror Sessions in AWS☆35Nov 15, 2025Updated 4 months ago
- This Sample Android App demonstrates the use of EnableX WebRTC platform Video APIs and Android Toolkit to build your own multi-party vide…☆12Jul 30, 2025Updated 8 months ago
- Queries for parsed spotlight database in sqlite☆13Dec 29, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- A deployment controller for anything 🚀☆14Mar 1, 2026Updated 3 weeks ago
- Start and stop AWS resources managed by Cloudformation for cost savings☆11Jan 24, 2023Updated 3 years ago
- Sonarqube cloudformation plugin, IaC security supports cfn-nag/checkov☆26Oct 4, 2024Updated last year
- Sample code for integrating AWS CloudFormation templates security tests (using CFN-Nag and CFN-Guard) with both AWS Security Hub and AWS …☆24Mar 23, 2024Updated 2 years ago
- A Python, Boto3 script that leverages a forensic volume to attach & mount to a selected instance, run a memory dump, unmount and detach f…☆12Jul 15, 2020Updated 5 years ago
- Terraform module to Automatically suppress findings recorded by the AWS Security Hub service based on a pre-defined and configurable supp…☆19Mar 10, 2026Updated 2 weeks ago
- Guard Duty Threat Feed: Automatically keeps FIRE_EYE feeds updated☆17Aug 17, 2018Updated 7 years ago
- 🌉 Reference implementation for granting cross-account AWS Glue Data Catalog access from Amazon Athena☆30Jul 25, 2022Updated 3 years ago
- The golden AMI pipeline enables creation, distribution, verification, launch-compliance, and decommissioning of the golden AMI out of the…☆11Jan 8, 2020Updated 6 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Overview about existing tools that can be useful for AWS auditing purposes.☆15Sep 25, 2017Updated 8 years ago
- aws inventory tool☆48Feb 8, 2022Updated 4 years ago
- automated monorepo of public CloudFormation AWS resource providers☆18Nov 1, 2025Updated 4 months ago
- Making it easy to implement Lambda-backed CloudFormation custom resources☆14Apr 1, 2018Updated 7 years ago
- Automation and remediation bots for Dome9's (Continuous) Compliance Engine☆114Jul 10, 2025Updated 8 months ago
- Terraform modules for an EC2 Image Builder Pipeline with an Amazon Linux 2 Baseline Container Recipe, which is used to deploy a Docker ba…☆42Apr 21, 2023Updated 2 years ago
- This project uses CDK Pipelines to define a self mutating pipeline to deploy EKS Cluster(s). It uses CDK for cluster, node, infrastructur…☆34Apr 10, 2025Updated 11 months ago