Example code snippets for AWS CloudTrail Event History Poisoning to Evade Attribution
-
Updated
Oct 1, 2022 - Python
Example code snippets for AWS CloudTrail Event History Poisoning to Evade Attribution
This Lambda function Start Logging Cloud Trail if it Stopped Logging and sends logs to CloudWatch Log group.
This is a script to export logs from AWS CloudTrail to a local file.
An Elastic beat for cloudtrail w/ S3 -> SNS -> SQS
Terraform project to setup the AWS account structure with state and roles
trail-digger is a tool for digging trail log files of AWS CloudTrail.
Terraform module to create Lambda resource on AWS for sending notification when anything done from console in AWS.
Terraform module to create an Secure Basline, inclued module is alarm baseline, config baseline, and clouddtrail baseline.
Automate the daily partitioning of your CloudTrail bucket in Athena
Easily export AWS CloudTrail events to ElasticSearch
Sending cloudtrail logs from s3 to AWS Elasticsearch using Lambda
Adaptive AWS Zero Trust Policy made easy: Auto-generate least-privilege policies based on user activity in real time! Accelerate the adoption of smart access control
Glue scripts for converting AWS Service Logs for use in Athena
Automatically tag AWS resources on creation, for cost assignment
Add a description, image, and links to the cloudtrail-logs topic page so that developers can more easily learn about it.
To associate your repository with the cloudtrail-logs topic, visit your repo's landing page and select "manage topics."