cisagov / cyhy_amis
AWS infrastructure for Cyber Hygiene and BOD 18-01 scanning
☆20Updated this week
Alternatives and similar repositories for cyhy_amis:
Users that are interested in cyhy_amis are comparing it to the libraries listed below
- Automated pshtt, trustymail, and sslyze scanning☆25Updated this week
- Certbot container that stores its configuration in an AWS S3 bucket☆13Updated this week
- Manage GuardDuty At Enterprise Scale☆22Updated 4 years ago
- FedRAMP Tailored.☆43Updated 3 years ago
- DEPRECATED: A set of utilities for converting and working with compliance data for viewing in the heimdall applications☆35Updated 3 years ago
- Create machine images containing the Nessus vulnerability scanner☆12Updated 3 weeks ago
- Landing Page Content/Builder for MITRE Security Automation Framework☆28Updated last week
- Automated process to build and distribute Posture & Exposure Reports' bi-weekly to customers.☆17Updated last year
- Coalfire GCP RAMP/pak Reference Architecture☆12Updated 5 months ago
- notes on configuring aws organizations☆11Updated 8 years ago
- Coalfire AWS RAMP/pak Reference Architecture☆36Updated 5 months ago
- Orchestrate gatherer, scanner, saver, and trustymail_reporter☆15Updated 2 months ago
- Create a Golden AMI Pipeline integrated with a Qualys Scanner for vulnerability assessments☆18Updated 5 years ago
- Packer.io Scripts to build the SIFT VM(s)☆11Updated 4 years ago
- This command line tool counts the number of resources in different categories across Amazon regions.☆57Updated 5 years ago
- Visualize your Terraform files☆34Updated 4 years ago
- Core incident handling plugins for aws_ir cli, incident pony, and more.☆21Updated 6 years ago
- Scripts to quickly fix security and compliance issues☆25Updated last year
- The open source version of the AWS Security Hub documentation. To provide feedback or request changes, you can submit a pull request that…☆35Updated last year
- A meta-database collecting resources that compile lists of breaches☆18Updated 3 months ago
- For use in our Tenable.IO to AWS Security Hub integration☆28Updated this week
- Terraform to deploy an assessment environment to the COOL☆14Updated 2 months ago
- A Security Results Viewer for the web with storage, teams and history☆35Updated 2 years ago
- CDK app to setup an isolated AWS network to experiment with ways of exfiltrating data☆18Updated 3 years ago
- OSCAL SSP content for technologies shipped by Red Hat☆15Updated last year
- Sample code snippets for consuming the CloudSploit API☆13Updated last year
- Cloudformation Template and Lambda to detect if Instance Profile credentials are being used outside your AWS Account.☆28Updated 5 years ago
- Public tables and other research that can accept PRs. Please visit the web link.☆44Updated 5 years ago
- GSA Security Benchmarks and Tools☆21Updated 5 years ago
- S3Insights is a platform for efficiently deriving security insights about S3 data through metadata analysis☆12Updated 2 months ago