puresec / sas-top-10
Serverless Architectures Security Top 10 Guide
☆332Updated 4 years ago
Related projects: ⓘ
- OWASP ServerlessGoat: a serverless application demonstrating common serverless security flaws☆313Updated last month
- AWS Serverless Security☆399Updated 2 years ago
- Serverless plugin for least privileges.☆247Updated 3 years ago
- ☆389Updated this week
- OWASP Serverless Top 10☆212Updated 3 years ago
- Open source application to instantly remediate common security issues through the use of AWS Config☆222Updated 4 years ago
- Security aspects of AWS products for the Security Specialist certification☆207Updated 2 years ago
- In this workshop, you will learn techniques to secure a serverless application built with AWS Lambda, Amazon API Gateway and RDS Aurora. …☆525Updated last month
- Resource types that can be publicly exposed on AWS☆312Updated 2 years ago
- for AWS Security material☆245Updated 2 years ago
- Dow Jones Hammer : Protect the cloud with the power of the cloud(AWS)☆434Updated last year
- a Damn Vulnerable Serverless Application☆532Updated last year
- Collection of scripts and resources for DevSecOps and Automated Incident Response Security☆612Updated 3 years ago
- Library and CLI tool for analysing CloudFormation templates and check them for security compliance.☆396Updated last week
- This repository can be used to generate and evaluate findings detected by Amazon GuardDuty☆335Updated 2 months ago
- This script automates the process of running the Security Hub multi-account workflow across a group of accounts that are in your control☆271Updated 8 months ago
- Open source demos, concept and guidance related to the AWS CIS Foundation framework.☆616Updated 4 years ago
- CloudTracker helps you find over-privileged IAM users and roles by comparing CloudTrail logs with current IAM policies.☆885Updated 2 years ago
- OWASP Cloud Security - Enabling conversations through threat and control stories☆175Updated 5 years ago
- Aardvark is a multi-account AWS IAM Access Advisor API☆471Updated last week
- Manage AWS Config Rules at scale in AWS multi-account and/or multi-region environment; with fully configurable deployment (RuleSets) and …☆275Updated 4 years ago
- An AWS tool to help you create a point in time assessment of your AWS account using Prowler.☆501Updated last month
- A project to collate IAM actions, AWS APIs and managed policies from various public sources.☆284Updated this week
- The AWS Config Rules Development Kit helps developers set up, author and test custom Config rules. It contains scripts to enable AWS Conf…☆454Updated 2 weeks ago
- Scans your AWS cloud resources and generates reports. Check out free hosted version:☆276Updated 3 years ago
- A centralized source of all AWS IAM privilege escalation methods released by Rhino Security Labs.☆892Updated 5 years ago
- This script automates the process of running the GuardDuty multi-account workflow across a group of accounts that are in your control☆129Updated this week
- Serverless Functions for establishing Reverse Shells to Lambda, Azure Functions, and Google Cloud Functions☆233Updated 3 weeks ago
- Automated Security Response on AWS is an add-on solution that works with AWS Security Hub to provide a ready-to-deploy architecture and a…☆380Updated this week
- AWS Identity and Access Management Visualizer and Anomaly Finder☆285Updated 2 months ago