Prevent cloud misconfigurations and find vulnerabilities during build-time in infrastructure as code, container images and open source packages with Checkov by Bridgecrew.
-
Updated
Jun 10, 2024 - Python
Prevent cloud misconfigurations and find vulnerabilities during build-time in infrastructure as code, container images and open source packages with Checkov by Bridgecrew.
An evolving repository of CloudTrail events with detailed descriptions, MITRE ATT&CK insights, real-world incidents, references and security implications
The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.
IAM Least Privilege Policy Generator
Example solutions demonstrating how to implement patterns within the AWS Security Reference Architecture guide using CloudFormation (including Customizations for AWS Control Tower) and Terraform.
Easy to deploy automations for incident response in AWS
Library and CLI tool for analysing CloudFormation templates and check them for security compliance.
AWSXenos will list all the trust relationships in all the IAM roles, S3 buckets, and more
ElectricEye is a multi-cloud, multi-SaaS Python CLI tool for Asset Management, Security Posture Management & Attack Surface Monitoring supporting 100s of services and evaluations to harden your CSP & SaaS environments with controls mapped to over 20 industry, regulatory, and best practice controls frameworks
cloudgrep is grep for cloud storage
Independently deploy customized honeyservices in AWS to trigger alerts on unauthorized access. It utilizes a dedicated CloudTrail for precise detection and notification specifically for honeyservices activity.
Adaptive AWS Zero Trust Policy made easy: Auto-generate least-privilege policies based on user activity in real time! Accelerate the adoption of smart access control
S3Insights is a platform for efficiently deriving security insights about S3 data through metadata analysis
Least privilege AWS IAM Terraformer
Validate File Content Type using AI/ML models for S3 file uploads using AWS lambda
A collection of awesome software, libraries, documents, books, resources and cool stuff about cryptography in Cybersecurity.
Perform near real-time "Automatic" remediation of CIS v1.4.0 NON-COMPLIANT resources in IAM, Storage, Monitoring, Logging, and Networking in an AWS Multi-account setup using Security Hub Findings
Project for analyzing logs from AWS ELB
Scripts, demos, PoC's, etc related to AWS security topics
Dow Jones Hammer : Protect the cloud with the power of the cloud(AWS)
Add a description, image, and links to the aws-security topic page so that developers can more easily learn about it.
To associate your repository with the aws-security topic, visit your repo's landing page and select "manage topics."