mitiga / log4shell-cloud-scannerLinks
we are providing DevOps and security teams script to identify cloud workloads that may be vulnerable to the Log4j vulnerability(CVE-2021-44228) in their AWS account. The script enables security teams to identify external-facing AWS assets by running the exploit on them, and thus be able to map them and quickly patch them
☆13Updated 3 years ago
Alternatives and similar repositories for log4shell-cloud-scanner
Users that are interested in log4shell-cloud-scanner are comparing it to the libraries listed below
Sorting:
- Policy Pipeline : place an SDLC around your compliance documentation with a pipeline that renders policy-as-code to human friendly format…☆11Updated 4 years ago
- A terraform module to install the prerequisites for cloud-custodian☆10Updated last year
- Certificate of Cloud Security Knowledge exam preparation kit☆11Updated 6 years ago
- OSCAL SSP content for technologies shipped by Red Hat☆15Updated 2 years ago
- Sample code snippets for consuming the CloudSploit API☆13Updated last year
- BlackDuck GItHub Action☆9Updated 2 years ago
- Repository for lab materials for the Advanced Cloud Security and Applied DevSecOps training class.☆11Updated 5 years ago
- Deceptive tradecraft should be fun and light, not stern and stressful. It is cool to be cute.☆13Updated last year
- DevSecOps Guide, located devsecops.pagerduty.com☆13Updated 3 years ago
- AWS container security survey 2020☆11Updated 4 years ago
- S3Insights is a platform for efficiently deriving security insights about S3 data through metadata analysis☆12Updated last month
- Tools to make CI Packer builds awesome☆23Updated last year
- A Security Results Viewer for the web with storage, teams and history☆35Updated 2 years ago
- A lambda function that checks your account for Public buckets and emails you whenever a new public s3 bucket is created☆15Updated 6 years ago
- The Auditree data gathering and reporting tool.☆15Updated 10 months ago
- Base infrastructure for future DevSecOps environment in AWS☆25Updated 4 years ago
- Automated determination of which AWS services run where☆20Updated this week
- A low/zero interaction ssh authentication logging honeypot☆22Updated 11 months ago
- An Incident Management Process / Post Mortem Template☆33Updated 6 years ago
- Ossec cookbook for Chef, with secure & automated key management☆21Updated 12 years ago
- Using Prowler to Automate Compliance Checks for AWS CIS Benchmarks☆9Updated 2 years ago
- Defensive S3 Bucket Squating☆30Updated 7 years ago
- A tool to check for rogue/orphaned AWS services running that cost money☆14Updated 7 years ago
- InSpec Profile to validate the secure configuration of aws-rds-infrastructure-cis-baseline, against CIS's Amazon Web Services Three-tier …☆14Updated 3 years ago
- It tells you when you VPN☆14Updated 2 years ago
- Kubernetes Native, Runtime Container Image Scanning☆39Updated 3 years ago
- Core incident handling plugins for aws_ir cli, incident pony, and more.☆21Updated 7 years ago
- ZAP Management Scripts☆23Updated last month
- Create machine images containing the Nessus vulnerability scanner☆13Updated 2 weeks ago
- Pragmatic Network Security for Cloud and Hybrid Networks☆11Updated 9 years ago