Detect AWS usage anomalies in near-real time using OpenSearch Anomaly Detection and CloudTrail for improved cost management and security
☆32May 21, 2024Updated last year
Alternatives and similar repositories for near-realtime-aws-usage-anomaly-detection
Users that are interested in near-realtime-aws-usage-anomaly-detection are comparing it to the libraries listed below
Sorting:
- ☆24Feb 8, 2024Updated 2 years ago
- ☆13Nov 5, 2024Updated last year
- This repository shows how to setup Centralized CloudWatch Observability Manager using Terraform☆17Nov 28, 2024Updated last year
- This pattern describes how to use AWS Control Tower Controls, AWS Cloud Development Kit (CDK) and infrastructure as code to implement and…☆41Feb 11, 2026Updated 3 weeks ago
- Protecting a Lambda Function URL with Amazon CloudFront and Lambda@Edge☆27Nov 28, 2024Updated last year
- ☆35Jan 27, 2023Updated 3 years ago
- This is a Vue starter for building a fullstack app with AWS Amplify.☆17Dec 15, 2024Updated last year
- Deploy Kubernetes Helm Charts for Check Point CloudGuard☆19Oct 21, 2025Updated 4 months ago
- Enhance GitHub security by revoking unused credentials automatically with TenTwentyOne's GitHub Action☆17Apr 4, 2025Updated 11 months ago
- ☆11May 1, 2024Updated last year
- Red-Team - AI Agent to Phish Employees based on Social Intelligence.☆23Dec 28, 2025Updated 2 months ago
- CDK project that leverages an OpenAPI definition to define, document and create an Amazon API Gateway deployment. At deploy time, a Cloud…☆11Dec 24, 2024Updated last year
- ☆17Nov 30, 2025Updated 3 months ago
- ☆12Jun 17, 2024Updated last year
- Palo Alto Networks AI Runtime Security Model Context Protocol (MCP) Relay Server☆31Jan 27, 2026Updated last month
- ☆30Feb 28, 2026Updated last week
- ☆13Jun 10, 2024Updated last year
- A Python CLI application that demonstrates how you can access AWS services, such as Amazon S3 and Amazon Athena, using trusted identity p…☆12Mar 11, 2025Updated 11 months ago
- ☆15Jul 2, 2024Updated last year
- Threat Designer is a GenerativeAI application designed to automate and streamline the threat modeling process for secure system design.☆233Updated this week
- Send AWS Lambda function logs directly to Elasticsearch☆11Nov 16, 2021Updated 4 years ago
- ☆14Jul 8, 2025Updated 8 months ago
- A save editor for Hellpoint.☆12Dec 24, 2020Updated 5 years ago
- ☆12Dec 7, 2023Updated 2 years ago
- Use Neo4j to help visualize, explore and analyze GCP resources and IAM across your organization☆11Sep 1, 2020Updated 5 years ago
- Utility to monitor AWS Redshift Performance☆12Jul 6, 2016Updated 9 years ago
- Educational Cybersecurity Gaming Experience☆10Dec 13, 2022Updated 3 years ago
- Configure and deploy AWS GuardDuty.☆11Sep 9, 2025Updated 6 months ago
- ☆12Oct 17, 2023Updated 2 years ago
- ☆11Jun 21, 2022Updated 3 years ago
- Terraform to run Scoutsuite security scan of projects within a Google Cloud Org. Report will be published to a GCS bucket.☆17Jan 5, 2026Updated 2 months ago
- ☆14Aug 5, 2024Updated last year
- Slack alert bot for matching Github Audit Events☆10Nov 12, 2024Updated last year
- The open source version of the Amazon Pinpoint User Guide. You can submit feedback & requests for changes by submitting issues in this re…☆10Jun 15, 2023Updated 2 years ago
- A lightweight tool designed to simplify the AWS credentials management.☆13May 7, 2025Updated 10 months ago
- Documentation for WASIX☆16Oct 31, 2024Updated last year
- Lambda function that automatically create or update AWS resource with AWS service's IP ranges from the ip-ranges.json file. You can confi…☆17Jul 2, 2024Updated last year
- "rsync for cloud storage" - Google Drive, S3, Dropbox, Backblaze B2, One Drive, Swift, Hubic, Wasabi, Google Cloud Storage, Azure Blob, A…☆20Oct 9, 2025Updated 5 months ago
- An Akka actor that writes JSON data into Amazon Kinesis Firehose.☆15Jan 14, 2026Updated last month