aws-samples / generative-ai-security-runbooksLinks
☆35Updated 3 weeks ago
Alternatives and similar repositories for generative-ai-security-runbooks
Users that are interested in generative-ai-security-runbooks are comparing it to the libraries listed below
Sorting:
- Data perimeter helper is a tool that helps you design and anticipate the impact of your data perimeter controls☆16Updated 3 months ago
- A toolset to juggle AWS roles for persistent access☆57Updated 10 months ago
- Threat Designer is a GenerativeAI application designed to automate and streamline the threat modeling process for secure system design.☆68Updated last week
- Based on Lightspin proprietary data, research, and our tracking of cloud security trends in the market, our research team has compiled a …☆40Updated 2 years ago
- A walkthrough of security controls for a serverless architecture via a demo application☆11Updated 3 years ago
- The following is a simple example of how LLMs and langchain agents can simplify asking questions to understand the security posture of a …☆23Updated last year
- ☆21Updated 2 years ago
- Utility for downloading and mounting EBS snapshots using the EBS Direct API's☆86Updated 3 months ago
- This package provides an easy way to create a refreshable boto3 Session with AWS Roles Anywhere.☆57Updated last month
- This repository shows how to setup Centralized CloudWatch Observability Manager using Terraform☆17Updated 7 months ago
- Safer AWS SCP deployments via real-time monitoring☆53Updated last year
- ☆9Updated 2 months ago
- ☆13Updated 4 years ago
- Repository to archive AWS Documentation for local use☆46Updated 8 months ago
- All-in-one security testing toolbox that brings together popular open source tools through a single MCP interface. Connected to an AI age…☆106Updated last week
- The Amazon Web Services (AWS) Config Resource Compliance Dashboard (CRCD) shows the inventory of your AWS resources, along with their com…☆23Updated this week
- ☆33Updated 2 years ago
- Identify all permitted data paths originating from the Internet to Network Interfaces within AWS Accounts across the entire AWS Organizat…☆39Updated last year
- This is a project to quickly accelerate the adoption of CloudFormation Guard syntax for use in AWS Config rules. The advantage of CloudF…☆12Updated 6 months ago
- Detect AWS usage anomalies in near-real time using OpenSearch Anomaly Detection and CloudTrail for improved cost management and security☆31Updated last year
- Vulnerable by Design AWS Cloud Development Kit (CDK) Infrastructure☆47Updated last year
- Automated AWS account hardening with AWS Control Tower and AWS Step Functions☆36Updated 3 months ago
- IAM-Deescalate helps mitigate privilege escalation risk in AWS identity and access management (IAM)☆98Updated 2 years ago
- An AWS IAM policy statement parser and query tool.☆188Updated last week
- ☆22Updated 2 years ago
- ☆19Updated last year
- Account Assessment for AWS Organizations programmatically scans all AWS accounts in an AWS Organization for identity-based and resource-b…☆40Updated last month
- ☆15Updated 7 months ago
- A collection of documented and undocumented AWS API models☆36Updated 7 months ago
- ☆17Updated 3 months ago