aws-samples / near-realtime-aws-usage-anomaly-detectionView external linksLinks
Detect AWS usage anomalies in near-real time using OpenSearch Anomaly Detection and CloudTrail for improved cost management and security
☆32May 21, 2024Updated last year
Alternatives and similar repositories for near-realtime-aws-usage-anomaly-detection
Users that are interested in near-realtime-aws-usage-anomaly-detection are comparing it to the libraries listed below
Sorting:
- ☆24Feb 8, 2024Updated 2 years ago
- ☆13Nov 5, 2024Updated last year
- This repository shows how to setup Centralized CloudWatch Observability Manager using Terraform☆17Nov 28, 2024Updated last year
- This pattern describes how to use AWS Control Tower Controls, AWS Cloud Development Kit (CDK) and infrastructure as code to implement and…☆41Updated this week
- ☆19Sep 15, 2025Updated 5 months ago
- ☆29Dec 26, 2025Updated last month
- Protecting a Lambda Function URL with Amazon CloudFront and Lambda@Edge☆27Nov 28, 2024Updated last year
- An AI agent skill that generates draft SOC 2 Type I/II, ISO 27001 compliance policies and automates evidence collection for startups, wit…☆16Updated this week
- ☆35Jan 27, 2023Updated 3 years ago
- This is a Vue starter for building a fullstack app with AWS Amplify.☆17Dec 15, 2024Updated last year
- ☆11May 1, 2024Updated last year
- Red-Team - AI Agent to Phish Employees based on Social Intelligence.☆22Dec 28, 2025Updated last month
- Enhance GitHub security by revoking unused credentials automatically with TenTwentyOne's GitHub Action☆17Apr 4, 2025Updated 10 months ago
- Threat Designer is a GenerativeAI application designed to automate and streamline the threat modeling process for secure system design.☆191Updated this week
- Generates runbooks for GuardDuty findings☆38Jun 24, 2024Updated last year
- CDK project that leverages an OpenAPI definition to define, document and create an Amazon API Gateway deployment. At deploy time, a Cloud…☆11Dec 24, 2024Updated last year
- ☆13Jun 10, 2024Updated last year
- Palo Alto Networks AI Runtime Security Model Context Protocol (MCP) Relay Server☆30Jan 27, 2026Updated 3 weeks ago
- Copilot coding adventures☆10Oct 24, 2023Updated 2 years ago
- A Python CLI application that demonstrates how you can access AWS services, such as Amazon S3 and Amazon Athena, using trusted identity p…☆12Mar 11, 2025Updated 11 months ago
- ☆16Nov 30, 2025Updated 2 months ago
- ☆12Jun 17, 2024Updated last year
- ☆11Oct 31, 2019Updated 6 years ago
- Educational Cybersecurity Gaming Experience☆10Dec 13, 2022Updated 3 years ago
- ☆11Jun 21, 2022Updated 3 years ago
- Using Twilio, AWS, and Electric Objects to create an MMS-powered family photo frame.☆10Sep 29, 2016Updated 9 years ago
- ⚡️🗑 2017 meets 1997☆11Aug 11, 2017Updated 8 years ago
- ☆14Aug 5, 2024Updated last year
- Utility to monitor AWS Redshift Performance☆12Jul 6, 2016Updated 9 years ago
- ☆12Dec 7, 2023Updated 2 years ago
- Configure and deploy AWS GuardDuty.☆11Sep 9, 2025Updated 5 months ago
- Slack alert bot for matching Github Audit Events☆10Nov 12, 2024Updated last year
- Use Neo4j to help visualize, explore and analyze GCP resources and IAM across your organization☆11Sep 1, 2020Updated 5 years ago
- Searchable encryption for DynamoDB using CipherStash and ZeroKMS☆11Updated this week
- Lambda function that automatically create or update AWS resource with AWS service's IP ranges from the ip-ranges.json file. You can confi…☆17Jul 2, 2024Updated last year
- ☆14Jul 8, 2025Updated 7 months ago
- ☆16Oct 17, 2023Updated 2 years ago
- This sample illustrates using data compression with AWS Lambda functions☆11Apr 10, 2025Updated 10 months ago
- SAM Template with Lambda Function to spin up a DynamoDB backed Movies API and attach APIGW Resource Policy to it.☆13Jun 12, 2018Updated 7 years ago