okta / okta-ocsf-syslogLinks
Conversion of Okta System Log to OCSF project template
☆12Updated last year
Alternatives and similar repositories for okta-ocsf-syslog
Users that are interested in okta-ocsf-syslog are comparing it to the libraries listed below
Sorting:
- AWS Security Analytics Bootstrap enables customers to perform security investigations on AWS service logs by providing an Amazon Athena a…☆249Updated this week
- ☆33Updated 4 months ago
- Automated Forensics Orchestrator for Amazon EC2 is a self-service AWS Solution implementation that enterprise customers can deploy to qui…☆64Updated last week
- Example policies demonstrating how to implement a data perimeter on AWS.☆167Updated last week
- Kickstart and manage your AWS Organization via Terraform☆103Updated 3 weeks ago
- ☆9Updated 2 months ago
- ☆93Updated last year
- Assisted Log Enabler for AWS - Find AWS resources that are not logging, and turn them on.☆256Updated this week
- Automated Amazon GuardDuty Security Response☆27Updated 6 months ago
- ☆156Updated last year
- A compliance analysis tool which enables organizations to more quickly articulate their compliance posture and also generate supporting e…☆45Updated last month
- SCP management tool☆132Updated last year
- OCSF (https://schema.ocsf.io/) models in Python using Pydantic.☆23Updated last week
- This solution supports a bidirectional integration between Security Hub and JIRA. Issues can be either created automatically or manually …☆39Updated 11 months ago
- This solutions facilitates rapid deployment of Prowler, full AWS Organization analysis, and finding processing as part of a security post…☆59Updated 3 weeks ago
- This repository contains a sample IAM permissions boundary as a starting point for creating your own permissions boundary to meet the s…☆82Updated 4 months ago
- The Amazon Elastic Kubernetes Service (EKS) Creation Engine (ECE) is a Python command-line program created by the Lightspin Office of the…☆40Updated 2 years ago
- ☆15Updated last month
- This implementation demonstrates the AWS Identity and Access Management (IAM) Access Analyzer policy validation capability. Learn how to …☆24Updated 3 years ago
- Example AWS Service control policies to get started or mature your usage of AWS SCPs.☆246Updated 3 months ago
- Identify all permitted data paths originating from the Internet to Network Interfaces within AWS Accounts across the entire AWS Organizat…☆39Updated last year
- ☆117Updated last month
- Convert cloudtrail data to MITRE ATT&CK Sightings☆80Updated 2 years ago
- A MITRE ATT&CK Navigator export for AWS GuardDuty Findings☆137Updated 3 years ago
- Generates runbooks for GuardDuty findings☆36Updated last year
- Runs IAM policy linting and security checks against either a single AWS account or a set of member accounts of an AWS Organization.☆145Updated last week
- ☆97Updated last year
- Automated AWS account hardening with AWS Control Tower and AWS Step Functions☆37Updated 3 months ago
- This solution is intended for enterprises that need a streamlined way of managing user access to their AWS accounts. Using this solution,…☆69Updated 3 months ago
- Crowdsourced list of sensitive IAM Actions☆151Updated 8 months ago