Assisted Log Enabler for AWS - Find AWS resources that are not logging, and turn them on.
☆273Mar 8, 2026Updated this week
Alternatives and similar repositories for assisted-log-enabler-for-aws
Users that are interested in assisted-log-enabler-for-aws are comparing it to the libraries listed below
Sorting:
- AWS Security Analytics Bootstrap enables customers to perform security investigations on AWS service logs by providing an Amazon Athena a…☆272Mar 2, 2026Updated last week
- AWS CloudSaga - Simulate security events in AWS☆473Updated this week
- An AWS tool to help you create a point in time assessment of your AWS account using Prowler.☆592Nov 12, 2025Updated 3 months ago
- Example AWS Service control policies to get started or mature your usage of AWS SCPs.☆287Updated this week
- This repository provides sample templates for security playbooks against various scenarios when using Amazon Web Services.☆649Updated this week
- Automated Security Response on AWS is an add-on solution that works with AWS Security Hub to provide a ready-to-deploy architecture and a…☆465Mar 3, 2026Updated last week
- Sample CloudFormation templates and architecture for AWS Control Tower☆29Aug 8, 2023Updated 2 years ago
- ☆15Jul 2, 2024Updated last year
- A simple threat modeling tool to help humans to reduce time-to-value when threat modeling☆683Updated this week
- ☆35Feb 27, 2025Updated last year
- Create a break glass role for emergency use in order to limit AWS production account access. Configure automatic alerts and logging of ac…☆180Nov 13, 2023Updated 2 years ago
- Example solutions demonstrating how to implement patterns within the AWS Security Reference Architecture guide using CloudFormation (incl…☆1,121Dec 12, 2025Updated 2 months ago
- ☆1,050Aug 22, 2025Updated 6 months ago
- ☆401Sep 25, 2023Updated 2 years ago
- CSV Manager for AWS Security Hub exports SecurityHub findings to a CSV file and allows you to mass-update SecurityHub findings by modifyi…☆17Jul 23, 2025Updated 7 months ago
- Enhance the security of your web applications effortlessly with AWS Firewall Factory. Safeguard your valuable assets through seamless WAF…☆254Nov 17, 2025Updated 3 months ago
- This repository can be used to generate and evaluate findings detected by Amazon GuardDuty☆420Jan 7, 2026Updated 2 months ago
- A command-line tool to get valuable information out of AWS CloudTrail☆830Mar 2, 2026Updated last week
- [Node, Python, Java] Repository of sample Custom Rules for AWS Config.☆1,728Mar 1, 2026Updated last week
- Lambda job in Python to automatically deploy Inspector agent to newly-launched EC2 instances☆30Jan 14, 2026Updated last month
- Access Undenied parses AWS AccessDenied CloudTrail events, explains the reasons for them, and offers actionable remediation steps. Open-s…☆267Jan 26, 2023Updated 3 years ago
- This solutions facilitates rapid deployment of Prowler, full AWS Organization analysis, and finding processing as part of a security post…☆61Jun 2, 2025Updated 9 months ago
- SCP management tool☆135Oct 23, 2023Updated 2 years ago
- ☆12Jun 17, 2024Updated last year
- ASEA developer support has ended, and the ASEA github repo will be marked Archived (read-only) by the end of 2025.☆758Nov 17, 2025Updated 3 months ago
- Sample code for integrating AWS CloudFormation templates security tests (using CFN-Nag and CFN-Guard) with both AWS Security Hub and AWS …☆24Mar 23, 2024Updated last year
- The AWS Config Rules Development Kit helps developers set up, author and test custom Config rules. It contains scripts to enable AWS Conf…☆476Updated this week
- AWS IAM linting library☆1,110Jan 7, 2026Updated 2 months ago
- This package provides an easy way to create a refreshable boto3 Session with AWS Roles Anywhere.☆58Feb 25, 2026Updated last week
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆101Jan 12, 2024Updated 2 years ago
- ElectricEye is a multi-cloud, multi-SaaS Python CLI tool for Asset Management, Security Posture Management & Attack Surface Monitoring su…☆1,034Feb 9, 2026Updated last month
- ASH is an extensible, open source SAST, SCA, and IaC security scanner orchestration engine.☆616Updated this week
- Identity & Access Management simplified and secure.☆260Mar 6, 2023Updated 3 years ago
- Workload Discovery on AWS is a solution to visualize AWS Cloud workloads. With it you can build, customize, and share architecture diagra…☆810Updated this week
- Example AWS Resource control policies to get started or mature your usage of AWS RCPs.☆198Updated this week
- Safer AWS SCP deployments via real-time monitoring☆56Sep 30, 2023Updated 2 years ago
- Identify all permitted data paths originating from the Internet to Network Interfaces within AWS Accounts across the entire AWS Organizat…☆42Sep 19, 2023Updated 2 years ago
- The AWS Deployment Framework (ADF) is an extensive and flexible framework to manage and deploy resources across multiple AWS accounts and…☆698Feb 14, 2026Updated 3 weeks ago
- A tool for quickly evaluating IAM permissions in AWS.☆1,544Aug 2, 2024Updated last year