ptdavies17 / CloudwatchFH2HEC
Cloudwatch Logs Transform for Firehose: formats into Splunk HEC Event
☆15Updated 10 months ago
Alternatives and similar repositories for CloudwatchFH2HEC:
Users that are interested in CloudwatchFH2HEC are comparing it to the libraries listed below
- Some of my personal rules for CapitalOne's Cloud Custodian project☆43Updated 3 years ago
- This code creates/configures a Kinesis Firehose in AWS to send CloudWatch log data to Splunk.☆75Updated 2 weeks ago
- Splunk AWS Serverless applications and Lambda blueprints☆57Updated 3 months ago
- AWS Quick Start Team☆40Updated 4 months ago
- automated AWS transit vpc☆41Updated 5 years ago
- Demonstrates sending AWS findings to your Slack Channel☆57Updated last year
- [WORK IN PROGRESS] A repo containing rule sets for cloud-custodian inside GSA AWS accounts. This repo does not contain cloud-custodian it…☆29Updated 7 years ago
- Manheim's Cloud Custodian (c7n) wrapper package, policy generator, runner, and supporting tools.☆45Updated this week
- A curated list of things relating to CapitalOne's Cloud-custodian project☆89Updated 4 years ago
- Audit IAM roles and users using Access Advisor data using Python/boto3 SDK and automatically create IAM permissions boundaries to limit a…☆37Updated 4 years ago
- Automate the AWS GuardDuty account invitation lifecycle for all of your organizations AWS accounts in all regions as well as aggregate an…☆66Updated last year
- Workshop exercise materials for re:Invent 2017 - SID 341: Using AWS CloudTrail Logs for Scalable, Automated Anomaly Detection☆51Updated 5 years ago
- Example code for setting up CIS Benchmarks using EventBridge☆19Updated 2 years ago
- This CloudWatch Events rule Lambda function evaluates AWS API calls that change Amazon EC2 security group ingress rules. The function fla…☆25Updated 5 years ago
- Lambda job in Python to automatically patch EC2 instances when an inspector assessment generates a CVE finding☆58Updated 6 years ago
- Cloud Custodian Policy Files and code☆67Updated 2 years ago
- An AWS config rule that uses IAM Access Advisor to find over-permissioned IAM users, groups, and roles.☆16Updated 5 years ago
- Simple tool to lookup EC2 instance information in your shell☆31Updated 6 years ago
- Dump your EC2 Security Groups as a CSV or JSON file☆70Updated last year
- Pre-configured response & remediation playbooks for AWS Security Hub☆65Updated 3 years ago
- ☆37Updated 4 years ago
- Cloud Custodian example policies that remediate security issues, enforce tagging, and control costs☆61Updated 2 years ago
- Example container image re-scan with Amazon ECR☆50Updated 3 years ago
- Wazuh - Amazon AWS Cloudformation☆40Updated last year
- ☆20Updated 5 years ago
- AWS Security Odyssey: A hands-on journey with security services and controls in the AWS cloud.☆45Updated 5 years ago
- Python scripts to run in AWS Lambda to process findings from Amazon Inspector☆39Updated 6 years ago
- GovCloud Import Tool allows you to import AMI, Snapshots, and S3 Buckets from AWS into AWS GovCloud (US).☆47Updated 2 years ago
- This ansible role gets information from an AWS VPC and generate a graphical representation of security groups☆103Updated 4 years ago
- (WIP) A terraform / kitchen-terraform hardening baseline for the cis-aws-foundations-baseline☆24Updated 3 years ago