straithe / ReadingAndResourceLists
Reading and resources lists on a variety of technical topics.
☆43Updated 4 years ago
Alternatives and similar repositories for ReadingAndResourceLists:
Users that are interested in ReadingAndResourceLists are comparing it to the libraries listed below
- ☆14Updated last year
- Create a Neo4J graph of users and roles trust policies within an AWS Organization.☆26Updated last year
- A collection of DoD and Federal Government Cloud Computing Resources☆48Updated 3 years ago
- This repo contains a list of aws security related talks.☆12Updated 7 years ago
- A collection of 2020 artifacts describing the major pain points, vulnerabilities and concerns with Cloud Security.☆19Updated 4 years ago
- CDK app to setup an isolated AWS network to experiment with ways of exfiltrating data☆18Updated 3 years ago
- SkyWrapper helps to discover suspicious creation forms and uses of temporary tokens in AWS☆104Updated 3 years ago
- This package provides an easy way to create a refreshable boto3 Session with AWS Roles Anywhere.☆51Updated 2 months ago
- Hands-on workshop on how to build security automation in pipelines☆37Updated 9 months ago
- This is a collection of AWS CloudFormation templates which create Lambda functions triggered by CloudWatch Events rule to evaluate AWS AP…☆52Updated 6 years ago
- AWS Security Cookbook, published by Packt☆43Updated 2 years ago
- Mitigations (AWS WAF, Lambda@Edge/CloudFront Functions) to implement on AWS to attempt to prevent log4j exploitation.☆22Updated 3 years ago
- Workshop and sample code that builders can use for experiential learning of AWS services that provide data protection. Services such as A…☆90Updated 7 months ago
- ☆26Updated 4 years ago
- Centralizing AWS CloudWatch log forwarding via EventBridge and Step Functions☆49Updated last year
- Mindmaps about AWS based on public information☆132Updated 2 years ago
- ThreatModel for Amazon S3 - Library of all the attack scenarios on Amazon S3, and how to mitigate them following a risk-based approach☆150Updated last year
- ☆19Updated 3 years ago
- Security Scanner based on CIS benchmark 1.1 inspired by Scout2☆53Updated last year
- Workshop exercise materials for re:Invent 2017 - SID 341: Using AWS CloudTrail Logs for Scalable, Automated Anomaly Detection☆51Updated 5 years ago
- A lightweight dockerized version of the AWS CLI☆48Updated this week
- Tools for AWS forensics☆64Updated 8 years ago
- The open source version of the AWS Security Hub documentation. To provide feedback or request changes, you can submit a pull request that…☆35Updated last year
- A tool that allows downloading S3 directories as ZIP files☆34Updated last year
- This implementation demonstrates the AWS Identity and Access Management (IAM) Access Analyzer policy validation capability. Learn how to …☆23Updated 2 years ago
- Automation of VPC Traffic Mirror Sessions in AWS☆35Updated 3 months ago
- ☆63Updated 5 months ago
- Scripts to quickly fix security and compliance issues☆25Updated last year
- A MITRE ATT&CK Navigator export for AWS GuardDuty Findings☆137Updated 3 years ago
- Automated Forensics Orchestrator for Amazon EC2 is a self-service AWS Solution implementation that enterprise customers can deploy to qui…☆59Updated 2 months ago