cisagov / cyhy_amisLinks
AWS infrastructure for Cyber Hygiene and BOD 18-01 scanning
☆23Updated last week
Alternatives and similar repositories for cyhy_amis
Users that are interested in cyhy_amis are comparing it to the libraries listed below
Sorting:
- Automated pshtt, trustymail, and sslyze scanning☆27Updated 2 weeks ago
- Certbot container that stores its configuration in an AWS S3 bucket☆15Updated 2 weeks ago
- This script is used to generate some basic detections of the aws security services☆71Updated 3 years ago
- Examples on how to maintain security/compliance as code and to automate SecOps using the JupiterOne platform.☆54Updated last year
- SyntheticSun is a defense-in-depth security automation and monitoring framework which utilizes threat intelligence, machine learning, man…☆80Updated 4 years ago
- Knowledge Report Alert & Normalization Generator☆27Updated last year
- DEPRECATED: A set of utilities for converting and working with compliance data for viewing in the heimdall applications☆35Updated 3 years ago
- Run individual configuration, compliance and security controls or full compliance benchmarks for CIS for Zoom using Powerpipe and Steampi…☆66Updated 2 months ago
- AWSXenos will list all the trust relationships in all the IAM roles, S3 buckets, and more☆64Updated 7 months ago
- Manage GuardDuty At Enterprise Scale☆22Updated 5 years ago
- A python module for orchestrating content acquisitions and analysis via amazon ssm.☆58Updated last year
- Security Scanner based on CIS benchmark 1.1 inspired by Scout2☆53Updated 2 years ago
- IAMFinder enumerates and finds users and IAM roles in a target AWS account.☆111Updated 4 years ago
- The MITRE Security Automation Framework (SAF) Command Line Interface (CLI) brings together applications, techniques, libraries, and tools…☆166Updated this week
- A public repository with scripts and tools for mass / automated onboarding of cloud accounts (AWS,Azure,GCP)☆24Updated 4 years ago
- For use in our Tenable.IO to AWS Security Hub integration☆28Updated last month
- Automation of VPC Traffic Mirror Sessions in AWS☆35Updated last year
- 'Continuous' AWS perimeter monitoring: Periodically scan internet facing AWS resources to detect misconfigured services.☆64Updated 6 years ago
- A Lambda-powered Security Orchestration framework for AWS GuardDuty☆53Updated 5 years ago
- SkyWrapper helps to discover suspicious creation forms and uses of temporary tokens in AWS☆108Updated 4 years ago
- Lightspin AWS IAM Vulnerability Scanner☆95Updated 4 years ago
- This command line tool counts the number of resources in different categories across Amazon regions.☆59Updated 5 years ago
- Visualize your Terraform files☆34Updated 5 years ago
- AWSATT&CK adds MITRE ATT&CK context and additional logging capabilities to Rhino Security Labs's open-source AWS exploitation framework, …☆46Updated 4 years ago
- Command line tool for working with Panther rules and policies☆42Updated this week
- Coalfire AWS RAMP/pak Reference Architecture☆37Updated last year
- Repository to archive GCP Documentation for local use☆16Updated 8 months ago
- Terraform modules for Sumo Logic resources☆16Updated last week
- Convert cloudtrail data to MITRE ATT&CK Sightings☆80Updated 3 years ago
- List of vendors that do not allow IMDSv2 enforcement☆143Updated last year