cisagov / cyhy_amisLinks
AWS infrastructure for Cyber Hygiene and BOD 18-01 scanning
☆23Updated this week
Alternatives and similar repositories for cyhy_amis
Users that are interested in cyhy_amis are comparing it to the libraries listed below
Sorting:
- Certbot container that stores its configuration in an AWS S3 bucket☆15Updated last week
- Terraform to deploy an assessment environment to the COOL☆16Updated 2 weeks ago
- Automated pshtt, trustymail, and sslyze scanning☆27Updated this week
- Manage GuardDuty At Enterprise Scale☆22Updated 5 years ago
- DEPRECATED: A set of utilities for converting and working with compliance data for viewing in the heimdall applications☆35Updated 3 years ago
- A collection of models for organizing, prioritizing, and understanding cybersecurity and information risk management concepts.☆25Updated last year
- 'Continuous' AWS perimeter monitoring: Periodically scan internet facing AWS resources to detect misconfigured services.☆64Updated 6 years ago
- A Lambda-powered Security Orchestration framework for AWS GuardDuty☆53Updated 5 years ago
- SyntheticSun is a defense-in-depth security automation and monitoring framework which utilizes threat intelligence, machine learning, man…☆81Updated 4 years ago
- Knowledge Report Alert & Normalization Generator☆27Updated last year
- Lightspin AWS IAM Vulnerability Scanner☆95Updated 4 years ago
- sgCheckup generates nmap output based on scanning your AWS Security Groups for unexpected open ports.☆82Updated 4 years ago
- Examples on how to maintain security/compliance as code and to automate SecOps using the JupiterOne platform.☆54Updated last year
- Tools for AWS forensics☆64Updated 9 years ago
- Core incident handling plugins for aws_ir cli, incident pony, and more.☆21Updated 7 years ago
- Security Scanner based on CIS benchmark 1.1 inspired by Scout2☆53Updated 2 years ago
- A Cloud Security Posture Manager or CSPM with a focus on security analysis for the modern cloud stack and a focus on the emerging threat …☆191Updated last year
- IAMFinder enumerates and finds users and IAM roles in a target AWS account.☆111Updated 5 years ago
- Run individual configuration, compliance and security controls or full compliance benchmarks for CIS for Zoom using Powerpipe and Steampi…☆66Updated 3 months ago
- Coalfire AWS RAMP/pak Reference Architecture☆37Updated last year
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆73Updated last year
- This command line tool counts the number of resources in different categories across Amazon regions.☆59Updated 5 years ago
- AWSXenos will list all the trust relationships in all the IAM roles, S3 buckets, and more☆64Updated 8 months ago
- A toolset to juggle AWS roles for persistent access☆60Updated last year
- ☆31Updated 5 months ago
- TrailAlerts is a AWS-native, serverless cloud-detection tool that lets you define simple rules as code and get rich alerts about events i…☆51Updated 2 weeks ago
- For use in our Tenable.IO to AWS Security Hub integration☆28Updated 2 months ago
- Prevent SSRF attacks on AWS EC2 via automated upgrades to the more secure Instance Metadata Service v2 (IMDSv2).☆143Updated 6 months ago
- Terraform modules for Sumo Logic resources☆16Updated this week
- AWSATT&CK adds MITRE ATT&CK context and additional logging capabilities to Rhino Security Labs's open-source AWS exploitation framework, …☆46Updated 4 years ago