Diffy is a digital forensics and incident response (DFIR) tool developed by Netflix's Security Intelligence and Response Team (SIRT).
Diffy allows a forensic investigator to quickly scope a compromise across cloud instances during an incident, and triage those instances for followup actions. Diffy is currently focused on Linux instances running within Amazon Web Services (AWS), but owing to our plugin structure, could support multiple platforms and cloud providers.
It's called "Diffy" because it helps a human investigator to identify the differences between instances, and because Alex pointed out that "The Difforensicator" was unnecessarily tricky.
See Releases for recent changes. See our Read the Docs site for well-formatted documentation.
- AWS (AWS Systems Manager / SSM)
- Local
- osquery
Each technology has its own plugins for targeting, collection and persistence.
Efficiently highlights outliers in security-relevant instance behavior. For example, you can use Diffy to tell you which of your instances are listening on an unexpected port, are running an unusual process, include a strange crontab entry, or have inserted a surprising kernel module.
Uses one, or both, of two methods to highlight differences:
- Collection of a "functional" baseline from a "clean" running instance, against which your instance group is compared, and
- Collection of a "clustered" baseline, in which all instances are surveyed, and outliers are made obvious.
Uses a modular plugin-based architecture. We currently include plugins for collection using osquery via AWS Systems Manager (formerly known as Simple Systems Manager or SSM).
Via pip:
pip install diffy
We are actively adding more plugins & tests, and improving the documentation.
Please see Guido's guidance regarding the Python 2.7 end of life date.