awslabs / amazon-inspector-finding-forwarder
Python scripts to run in AWS Lambda to process findings from Amazon Inspector
☆39Updated 6 years ago
Alternatives and similar repositories for amazon-inspector-finding-forwarder:
Users that are interested in amazon-inspector-finding-forwarder are comparing it to the libraries listed below
- Lambda job in Python to automatically deploy Inspector agent to newly-launched EC2 instances☆28Updated 6 years ago
- Lambda job in Python to automatically patch EC2 instances when an inspector assessment generates a CVE finding☆58Updated 6 years ago
- This CloudWatch Events rule Lambda function evaluates AWS API calls that change Amazon EC2 security group ingress rules. The function fla…☆25Updated 5 years ago
- AWS Security Odyssey: A hands-on journey with security services and controls in the AWS cloud.☆45Updated 5 years ago
- This is a collection of AWS CloudFormation templates which create Lambda functions triggered by CloudWatch Events rule to evaluate AWS AP…☆52Updated 6 years ago
- An automated reference implementation that assists with setting up corss account roles for easy federation of users from one AWS master a…☆57Updated 6 years ago
- [WORK IN PROGRESS] A repo containing rule sets for cloud-custodian inside GSA AWS accounts. This repo does not contain cloud-custodian it…☆29Updated 7 years ago
- This post will explore the idea of using an AWS Lambda function, in combination with AutoScaling Lifecycle Hooks and a DynamoDB table, to…☆53Updated 5 years ago
- Workshop exercise materials for re:Invent 2017 - SID 341: Using AWS CloudTrail Logs for Scalable, Automated Anomaly Detection☆51Updated 5 years ago
- AWS GD2ACL☆56Updated 7 months ago
- Creates a CloudFormation stack for running Security Monkey☆27Updated 6 years ago
- Some of my personal rules for CapitalOne's Cloud Custodian project☆44Updated 3 years ago
- A serverless application for processing AWS GuardDuty findings.☆11Updated 6 years ago
- ☆57Updated last year
- Demonstrates sending AWS findings to your Slack Channel☆57Updated last year
- An AWS config rule that uses IAM Access Advisor to find over-permissioned IAM users, groups, and roles.☆16Updated 5 years ago
- A Step Functions microservice for remediating GuardDuty findings.☆18Updated 2 years ago
- The open source version of the Amazon GuardDuty documentation. You can provide feedback & requests for changes by submitting issues in th…☆21Updated last year
- This script automates the process of running the GuardDuty multi-account workflow across a group of accounts that are in your control☆129Updated 6 months ago
- ☆27Updated 4 months ago
- Workshop on how to implement automated remediations of findings submitted to AWS Security Hub leveraging an open source tool named Cloud …☆22Updated 3 years ago
- CloudTrail and CloudWatch configuration with some basic security alarms.☆18Updated 7 years ago
- CloudFormation Macro/Transform Examples☆26Updated 6 years ago
- AWS Landing Zone Template☆39Updated 4 years ago
- Audit IAM roles and users using Access Advisor data using Python/boto3 SDK and automatically create IAM permissions boundaries to limit a…☆37Updated 4 years ago
- AWS Quick Start Team☆67Updated 2 years ago
- This package includes a set of PowerShell scripts that run inside an AWS Fargate task and keep AWS IAM roles synchronized with Azure Acti…☆31Updated 5 years ago
- CloudFormation Custom Resource can be leveraged to query AWS DynamoDB via an AWS Lambda function to retrieve the key value pairs, replaci…☆31Updated 7 years ago
- Demonstrates sending AWS SecurityHub findings to your email☆14Updated 6 years ago
- Cloud Custodian Policy Files and code☆67Updated 2 years ago