aws-samples / generative-ai-security-runbooks
☆26Updated 8 months ago
Alternatives and similar repositories for generative-ai-security-runbooks:
Users that are interested in generative-ai-security-runbooks are comparing it to the libraries listed below
- This package provides an easy way to create a refreshable boto3 Session with AWS Roles Anywhere.☆54Updated 4 months ago
- Based on Lightspin proprietary data, research, and our tracking of cloud security trends in the market, our research team has compiled a …☆40Updated 2 years ago
- A walkthrough of security controls for a serverless architecture via a demo application☆11Updated 2 years ago
- ☆17Updated 3 weeks ago
- ☆14Updated 4 months ago
- Vulnerable by Design AWS Cloud Development Kit (CDK) Infrastructure☆46Updated last year
- ☆21Updated last year
- Repository to archive AWS Documentation for local use☆43Updated 5 months ago
- A toolset to juggle AWS roles for persistent access☆54Updated 7 months ago
- The following is a simple example of how LLMs and langchain agents can simplify asking questions to understand the security posture of a …☆21Updated last year
- Data perimeter helper is a tool that helps you design and anticipate the impact of your data perimeter controls☆16Updated 3 weeks ago
- ☆33Updated 2 years ago
- Utility for downloading and mounting EBS snapshots using the EBS Direct API's☆82Updated 2 weeks ago
- Hands-on workshop on how to build security automation in pipelines☆37Updated 11 months ago
- ☆13Updated 3 years ago
- ☆22Updated 2 years ago
- ☆38Updated 4 months ago
- The Automations For AWS Firewall Manager solution is intended for customers looking to easily manage consistent security posture across t…☆31Updated last month
- ☆39Updated 3 years ago
- ☆32Updated last month
- ☆21Updated 10 months ago
- Safer AWS SCP deployments via real-time monitoring☆50Updated last year
- ☆11Updated 9 months ago
- AWSATT&CK adds MITRE ATT&CK context and additional logging capabilities to Rhino Security Labs's open-source AWS exploitation framework, …☆45Updated 4 years ago
- ☆32Updated 8 months ago
- ☆20Updated 2 years ago
- ☆19Updated last week
- ☆41Updated last year
- IAM-Deescalate helps mitigate privilege escalation risk in AWS identity and access management (IAM)☆98Updated 2 years ago
- ☆44Updated 2 months ago