trendmicro / cloudone-filestorage-deployment-templates
☆16Updated 3 weeks ago
Alternatives and similar repositories for cloudone-filestorage-deployment-templates:
Users that are interested in cloudone-filestorage-deployment-templates are comparing it to the libraries listed below
- Trend Micro Cloud One File Storage Security plugins reference code.☆42Updated 5 months ago
- Collection of Trend Micro Open Source Community Projects☆20Updated 11 months ago
- ☆89Updated last year
- Automated Forensics Orchestrator for Amazon EC2 is a self-service AWS Solution implementation that enterprise customers can deploy to qui…☆59Updated 4 months ago
- AWSATT&CK adds MITRE ATT&CK context and additional logging capabilities to Rhino Security Labs's open-source AWS exploitation framework, …☆45Updated 4 years ago
- AWS Certified Security Specialty (2020) course notes☆117Updated 4 years ago
- SyntheticSun is a defense-in-depth security automation and monitoring framework which utilizes threat intelligence, machine learning, man…☆77Updated 3 years ago
- The open source version of the AWS Security Hub documentation. To provide feedback or request changes, you can submit a pull request that…☆35Updated last year
- Helm chart for Trend Micro Cloud One Container Security☆19Updated 3 weeks ago
- AWS Security Analytics Bootstrap enables customers to perform security investigations on AWS service logs by providing an Amazon Athena a…☆246Updated this week
- Identify all permitted data paths originating from the Internet to Network Interfaces within AWS Accounts across the entire AWS Organizat…☆39Updated last year
- This solutions facilitates rapid deployment of Prowler, full AWS Organization analysis, and finding processing as part of a security post…☆55Updated 3 months ago
- ThreatModel for Amazon S3 - Library of all the attack scenarios on Amazon S3, and how to mitigate them following a risk-based approach☆152Updated last year
- ☆33Updated 9 months ago
- Assisted Log Enabler for AWS - Find AWS resources that are not logging, and turn them on.☆253Updated this week
- Automated Amazon GuardDuty Security Response☆27Updated 3 months ago
- KaiMonkey provides vulnerable infrastructure as code (IaC) to help explore and understand common cloud security threats exposed via IaC.☆98Updated last year
- Resource types that can be publicly exposed on AWS☆324Updated 3 years ago
- Pre-configured response & remediation playbooks for AWS Security Hub☆65Updated 3 years ago
- Hands-on workshop on how to build security automation in pipelines☆37Updated 11 months ago
- Example AWS Service control policies to get started or mature your usage of AWS SCPs.☆237Updated 3 weeks ago
- Tracker for Encryption by Default for AWS Resources☆14Updated 3 months ago
- Deliberately vulnerable AWS resources for security assessment demos☆31Updated 2 years ago
- NIST based open source security automation delivered as AWS cloudformation☆18Updated 5 years ago
- An AWS IAM policy statement parser and query tool.☆175Updated last year
- Tools for AWS forensics☆63Updated 9 years ago
- Terraform provider for managing Wiz resources☆29Updated 2 weeks ago
- ☆122Updated last week
- A MITRE ATT&CK Navigator export for AWS GuardDuty Findings☆137Updated 3 years ago
- Notes for the SCS-C01: AWS Certified Security - Specialty exam.☆13Updated 9 months ago