lacework-dev / container-auto-scanLinks
Trigger vulnerability assessments for containers which are active in a Lacework account/organization
☆22Updated last year
Alternatives and similar repositories for container-auto-scan
Users that are interested in container-auto-scan are comparing it to the libraries listed below
Sorting:
- Cloud Formation resources for integrating Lacework with an AWS Organization (NOT using Control Tower)☆11Updated 2 weeks ago
- Handy scripts and code snippets for use with Lacework.☆61Updated 5 months ago
- A command line tool for generating Lacework FortiCNAPP Reports☆17Updated last month
- A python module to allow for easy integration with the Lacework APIs.☆18Updated 10 months ago
- ☆11Updated 8 months ago
- ☆97Updated last year
- Sample pipeline demo highlighting how to integrate Falcon Container Sensor into ECS Fargate Workloads☆10Updated 6 months ago
- Prisma Cloud sizing scripts☆47Updated last month
- Terraform provider for Prisma Cloud Compute☆25Updated 2 months ago
- ☆372Updated last year
- Create custom auto-remediation solutions using serverless functions in the cloud.☆53Updated last year
- Workshop showing you how to setup Amazon Web Services to send data to Splunk☆74Updated 4 years ago
- Terraform PrismaCloud provider☆54Updated 2 months ago
- AWS Organizations Service Control Policies (SCPs) written in HashiCorp Terraform.☆241Updated 7 months ago
- Grand Central logging for Cloud Services to Splunk☆36Updated 3 years ago
- Prisma Cloud API tools for convenience and general utility.☆18Updated 4 years ago
- ☆37Updated 5 years ago
- ☆19Updated last week
- A collection of projects supporting AWS Integration☆155Updated last week
- Prisma Cloud serverless function that can accept webhook and send alerts to syslog, S3, and SQS☆15Updated 2 years ago
- List of vendors that do not allow IMDSv2 enforcement☆142Updated last year
- AWS Security Analytics Bootstrap enables customers to perform security investigations on AWS service logs by providing an Amazon Athena a…☆245Updated this week
- A set of tools and libraries written in Go to interact with the Lacework platform.☆37Updated last week
- Splunk Operator for Kubernetes☆222Updated this week
- Open Cloud Security Posture Management Engine☆340Updated 3 years ago
- Postman collections for Prisma Cloud☆76Updated 9 months ago
- Dynamically generate and hunt with Lacework LQL queries quickly and efficiently☆27Updated last year
- Python installable command line utiltity for mitigation of host and key compromises.☆345Updated 3 years ago
- Azure Functions for getting data in to Splunk☆32Updated 3 months ago
- This repository can be used to generate and evaluate findings detected by Amazon GuardDuty☆393Updated last month