aws-samples / near-realtime-aws-usage-anomaly-detectionLinks
Detect AWS usage anomalies in near-real time using OpenSearch Anomaly Detection and CloudTrail for improved cost management and security
☆32Updated last year
Alternatives and similar repositories for near-realtime-aws-usage-anomaly-detection
Users that are interested in near-realtime-aws-usage-anomaly-detection are comparing it to the libraries listed below
Sorting:
- Example policies demonstrating how to implement a data perimeter on AWS.☆176Updated 2 weeks ago
- Accelerate AWS IAM Identity Center (successor to AWS Single Sign-On (SSO)) implementation using AWS CDK. This CDK program allows you to c…☆35Updated 2 years ago
- This solution supports a bidirectional integration between Security Hub and JIRA. Issues can be either created automatically or manually …☆41Updated last year
- This solution is intended for enterprises that need a streamlined way of managing user access to their AWS accounts. Using this solution,…☆70Updated 4 months ago
- Collection of samples for Management and Governance services☆68Updated 4 months ago
- ☆90Updated 3 months ago
- This solutions facilitates rapid deployment of Prowler, full AWS Organization analysis, and finding processing as part of a security post…☆62Updated 2 months ago
- SCP management tool☆133Updated last year
- ☆141Updated 3 months ago
- This project provides a solution to AWS customers for reporting on what tags exists, the resources they are applied to, and what resource…☆22Updated last year
- The Sensitive Data Protection on AWS solution allows enterprise customers to create data catalogs, discover, protect, and visualize sensi…☆120Updated 6 months ago
- Serverless Ops Review is an open source tool that automatically generates operational review and configuration reports about AWS serverle…☆31Updated last year
- Automated AWS Organizations configuration for security operations☆36Updated 6 months ago
- Automated AWS account hardening with AWS Control Tower and AWS Step Functions☆38Updated 5 months ago
- This repository contains a sample IAM permissions boundary as a starting point for creating your own permissions boundary to meet the s…☆83Updated 6 months ago
- This repository shows how to setup Centralized CloudWatch Observability Manager using Terraform☆18Updated 9 months ago
- AWS IAM Permissions Guardrails https://aws-samples.github.io/aws-iam-permissions-guardrails/☆124Updated 2 years ago
- This solution will help you automate user group assignment to permission sets in AWS IAM Identity center for accessing any or all AWS acc…☆25Updated 5 months ago
- Rules Registry for Compliance Frameworks☆129Updated last year
- ☆39Updated 3 years ago
- Example AWS Service control policies to get started or mature your usage of AWS SCPs.☆250Updated last month
- ☆34Updated 3 years ago
- L3 construct that can be used to quickly deploy a complete EC2 Image Builder Image Pipeline☆44Updated this week
- Collection of example Service Control Policies (SCPs) that are useful for sandbox and training AWS accounts.☆153Updated 2 months ago
- The Amazon Web Services (AWS) Config Resource Compliance Dashboard (CRCD) shows the inventory of your AWS resources, along with their com…☆23Updated 2 weeks ago
- Account Assessment for AWS Organizations programmatically scans all AWS accounts in an AWS Organization for identity-based and resource-b…☆40Updated 3 weeks ago
- Customize the format of Amazon CloudWatch alarms email notifications using Amazon SES and AWS Lambda☆19Updated 2 years ago
- ☆77Updated last week
- The AWS Operational Readiness Review (ORR) acts as a sanity & safety check for a new workload built on AWS services, assessed before the …☆22Updated last year
- ☆22Updated last year