tradichel / SecurityMetricsAutomationLinks
☆41Updated last year
Alternatives and similar repositories for SecurityMetricsAutomation
Users that are interested in SecurityMetricsAutomation are comparing it to the libraries listed below
Sorting:
- Generates runbooks for GuardDuty findings☆36Updated last year
- Coalfire AWS RAMP/pak Reference Architecture☆36Updated 10 months ago
- Identify all permitted data paths originating from the Internet to Network Interfaces within AWS Accounts across the entire AWS Organizat…☆39Updated last year
- CloudSplaining on AWS Managed Policies☆44Updated last week
- Scripts to quickly fix security and compliance issues☆27Updated last year
- https://breaches.cloud☆41Updated 8 months ago
- AWS SSO Reporter☆54Updated 2 months ago
- Collect IAM information from all your AWS organization, accounts, and resources.☆36Updated this week
- Safer AWS SCP deployments via real-time monitoring☆53Updated last year
- Automated Forensics Orchestrator for Amazon EC2 is a self-service AWS Solution implementation that enterprise customers can deploy to qui…☆64Updated 2 weeks ago
- Convert cloudtrail data to MITRE ATT&CK Sightings☆80Updated 2 years ago
- Assess certain AWS network configurations☆12Updated 6 years ago
- ThreatModel for Amazon S3 - Library of all the attack scenarios on Amazon S3, and how to mitigate them following a risk-based approach☆156Updated last year
- Crowdsourced list of sensitive IAM Actions☆151Updated 8 months ago
- ☆39Updated 3 years ago
- Compares and analyzes GCP IAM roles.☆77Updated 4 months ago
- This package provides an easy way to create a refreshable boto3 Session with AWS Roles Anywhere.☆58Updated 2 months ago
- Knowledge Report Alert & Normalization Generator☆27Updated last year
- CDK app to setup an isolated AWS network to experiment with ways of exfiltrating data☆18Updated 3 years ago
- A Lambda-powered Security Orchestration framework for AWS GuardDuty☆52Updated 5 years ago
- ☆95Updated last year
- To clean up your AWS AMIs: First, include AMIs by name or tag. Second, exclude AMIs in use, younger than N days, or the newest N images. …☆34Updated 2 weeks ago
- Offensive Terraform Website☆45Updated 4 years ago
- A collection of useful queries that can be used to verify compliance/security across your AWS assets☆30Updated 6 years ago
- ☆32Updated last year
- This command line tool counts the number of resources in different categories across Amazon regions.☆59Updated 5 years ago
- Vulnerable by Design AWS Cloud Development Kit (CDK) Infrastructure☆47Updated last year
- ☆33Updated 4 months ago
- Create a Neo4J graph of users and roles trust policies within an AWS Organization.☆26Updated last year
- The open source version of the AWS Security Hub documentation. To provide feedback or request changes, you can submit a pull request that…☆35Updated 2 years ago