awsrossw / aws-scaling-threat-detection-workshopLinks
A hands-on workshop to learn how to do threat detection and response in AWS.
☆17Updated 3 years ago
Alternatives and similar repositories for aws-scaling-threat-detection-workshop
Users that are interested in aws-scaling-threat-detection-workshop are comparing it to the libraries listed below
Sorting:
- ☆374Updated last year
- AWS Security Analytics Bootstrap enables customers to perform security investigations on AWS service logs by providing an Amazon Athena a…☆255Updated last week
- A MITRE ATT&CK Navigator export for AWS GuardDuty Findings☆138Updated 4 years ago
- A collection of projects supporting AWS Integration☆155Updated last week
- ☆156Updated 2 years ago
- Pre-configured response & remediation playbooks for AWS Security Hub☆65Updated 3 years ago
- This repository can be used to generate and evaluate findings detected by Amazon GuardDuty☆408Updated 2 months ago
- Resource types that can be publicly exposed on AWS☆328Updated 3 years ago
- Open Cloud Security Posture Management Engine☆342Updated 3 years ago
- AWS Inventory and Compliance Framework☆225Updated 2 years ago
- SkyWrapper helps to discover suspicious creation forms and uses of temporary tokens in AWS☆108Updated 4 years ago
- ☆393Updated last year
- ☆97Updated last year
- AWS CloudSaga - Simulate security events in AWS☆468Updated this week
- ☆26Updated 5 years ago
- Incident Response and Forensic on AWS☆20Updated 5 years ago
- Convert cloudtrail data to MITRE ATT&CK Sightings☆80Updated 3 years ago
- Code examples for the AWS Security Blog post: How to use CI/CD to deploy and configure AWS security services with Terraform☆97Updated 4 years ago
- A small set of scripts to summarize AWS Security Groups, and generate visualizations of the rules.☆63Updated 5 years ago
- List of vendors that do not allow IMDSv2 enforcement☆143Updated last year
- Automated Forensics Orchestrator for Amazon EC2 and EKS is a self-service AWS Guidance implementation that enterprise customers can deplo…☆65Updated last month
- Threat model for Amazon S3 - Library of all the attack scenarios on Amazon S3, and how to mitigate them following a risk-based approach☆157Updated last year
- Assisted Log Enabler for AWS - Find AWS resources that are not logging, and turn them on.☆263Updated this week
- AWS Organizations Service Control Policies (SCPs) written in HashiCorp Terraform.☆244Updated 10 months ago
- ☆37Updated 5 years ago
- Example policies demonstrating how to implement a data perimeter on AWS.☆176Updated this week
- A docker container to simplify and secure the use of Infrastructure as Code (IaC)☆77Updated this week
- ☆121Updated 3 months ago
- Identify all permitted data paths originating from the Internet to Network Interfaces within AWS Accounts across the entire AWS Organizat…☆40Updated last year
- Publicly-listed AWS account IDs for easy lookup. Great for cleaning up false positives from unknown Account IDs in Cloudtrail☆39Updated last year