aws-solutions-library-samples / automated-forensic-orchestrator-for-amazon-ec2
Automated Forensics Orchestrator for Amazon EC2 is a self-service AWS Solution implementation that enterprise customers can deploy to quickly set up and configure an automated orchestration workflow that enables their Security Operations Centre (SOC) to capture and examine data from EC2 instances and attached volumes as evidence for forensic ana…
☆62Updated last week
Alternatives and similar repositories for automated-forensic-orchestrator-for-amazon-ec2
Users that are interested in automated-forensic-orchestrator-for-amazon-ec2 are comparing it to the libraries listed below
Sorting:
- ☆91Updated last year
- AWS Security Analytics Bootstrap enables customers to perform security investigations on AWS service logs by providing an Amazon Athena a…☆247Updated this week
- Automated Amazon GuardDuty Security Response☆27Updated 4 months ago
- This solutions facilitates rapid deployment of Prowler, full AWS Organization analysis, and finding processing as part of a security post…☆57Updated 5 months ago
- SCP management tool☆131Updated last year
- Assisted Log Enabler for AWS - Find AWS resources that are not logging, and turn them on.☆254Updated this week
- This solution supports a bidirectional integration between Security Hub and JIRA. Issues can be either created automatically or manually …☆38Updated 9 months ago
- Convert cloudtrail data to MITRE ATT&CK Sightings☆80Updated 2 years ago
- ☆117Updated last month
- Example policies demonstrating how to implement a data perimeter on AWS.☆156Updated 3 weeks ago
- Pre-configured response & remediation playbooks for AWS Security Hub☆65Updated 3 years ago
- Generates runbooks for GuardDuty findings☆35Updated 10 months ago
- Identify all permitted data paths originating from the Internet to Network Interfaces within AWS Accounts across the entire AWS Organizat…☆39Updated last year
- ThreatModel for Amazon S3 - Library of all the attack scenarios on Amazon S3, and how to mitigate them following a risk-based approach☆153Updated last year
- Safer AWS SCP deployments via real-time monitoring☆51Updated last year
- Crowdsourced list of sensitive IAM Actions☆145Updated 6 months ago
- ☆9Updated last month
- Runs IAM policy linting and security checks against either a single AWS account or a set of member accounts of an AWS Organization.☆143Updated 2 months ago
- The Amazon Elastic Kubernetes Service (EKS) Creation Engine (ECE) is a Python command-line program created by the Lightspin Office of the…☆40Updated 2 years ago
- Example AWS Service control policies to get started or mature your usage of AWS SCPs.☆241Updated 2 months ago
- ☆32Updated 2 months ago
- AWS SSO Reporter☆54Updated last week
- ☆21Updated 2 years ago
- ☆26Updated 4 years ago
- Data perimeter helper is a tool that helps you design and anticipate the impact of your data perimeter controls☆16Updated 2 months ago
- ☆88Updated last year
- Coalfire AWS RAMP/pak Reference Architecture☆36Updated 8 months ago
- ☆41Updated last year
- ☆33Updated 11 months ago
- ☆39Updated 3 years ago