awslabs / threat-designer
Threat Designer is a GenerativeAI application designed to automate and streamline the threat modeling process for secure system design.
☆16Updated last month
Alternatives and similar repositories for threat-designer:
Users that are interested in threat-designer are comparing it to the libraries listed below
- ☆12Updated 9 months ago
- Detect AWS usage anomalies in near-real time using OpenSearch Anomaly Detection and CloudTrail for improved cost management and security☆30Updated 11 months ago
- Account Assessment for AWS Organizations programmatically scans all AWS accounts in an AWS Organization for identity-based and resource-b…☆35Updated 2 months ago
- ☆15Updated 5 months ago
- Customize the format of Amazon CloudWatch alarms email notifications using Amazon SES and AWS Lambda☆19Updated 2 years ago
- This project provides a solution to AWS customers for reporting on what tags exists, the resources they are applied to, and what resource…☆21Updated last year
- The Amazon Web Services (AWS) Config Resource Compliance Dashboard (CRCD) shows the inventory of your AWS resources, along with their com…☆22Updated this week
- ☆12Updated last month
- This pattern describes how to use AWS Control Tower Controls, AWS Cloud Development Kit (CDK) and infrastructure as code to implement and…☆41Updated last week
- Elevate Your DevOps Pipeline with Generative AI☆22Updated 2 months ago
- Accelerate AWS IAM Identity Center (successor to AWS Single Sign-On (SSO)) implementation using AWS CDK. This CDK program allows you to c…☆30Updated 2 years ago
- The Generative AI Atlas is an organized repository designed for individuals seeking to explore the newest content released by AWS on Gene…☆16Updated 3 months ago
- ☆11Updated 7 months ago
- This Guidance helps organizations provide their data scientists with external package repository access while maintaining information sec…☆22Updated 6 months ago
- This repository shows how to setup Centralized CloudWatch Observability Manager using Terraform☆17Updated 4 months ago
- ☆12Updated 2 months ago
- ☆23Updated 6 months ago
- L3 construct that can be used to quickly deploy a complete EC2 Image Builder Image Pipeline☆41Updated this week
- ☆33Updated this week
- Guidance for Organization on AWS☆11Updated last month
- This repository contains the infrastructure as code to bootstrap your next CI/CD project. It is developed with security best practices in…☆32Updated 7 months ago
- Centralized Network Inspection on AWS configures the AWS resources needed to filter network traffic. This solution saves you time by auto…☆43Updated last month
- Automated AWS account hardening with AWS Control Tower and AWS Step Functions☆36Updated last month
- This Guidance helps customers assess their foundational security setup in their AWS account☆17Updated 6 months ago
- Serverless Ops Review is an open source tool that automatically generates operational review and configuration reports about AWS serverle…☆30Updated 10 months ago
- ☆30Updated 4 months ago
- ☆12Updated 10 months ago
- ☆20Updated 3 months ago
- This example demonstrates a pattern to leverage multiple identity providers with an API Gateway and manage Authorization with Amazon Veri…☆18Updated last year
- The Alarm Context Tool (ACT) enhances AWS CloudWatch Alarms by providing additional context to aid in troubleshooting and analysis.☆33Updated 10 months ago