Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/awslabs/aws-security-automation
Collection of scripts and resources for DevSecOps and Automated Incident Response Security
https://github.com/awslabs/aws-security-automation
Last synced: about 1 month ago
JSON representation
Collection of scripts and resources for DevSecOps and Automated Incident Response Security
- Host: GitHub
- URL: https://github.com/awslabs/aws-security-automation
- Owner: awslabs
- License: apache-2.0
- Created: 2016-03-10T19:33:28.000Z (almost 9 years ago)
- Default Branch: master
- Last Pushed: 2021-01-08T05:55:30.000Z (almost 4 years ago)
- Last Synced: 2024-07-31T07:15:15.554Z (4 months ago)
- Language: Python
- Size: 807 KB
- Stars: 606
- Watchers: 116
- Forks: 200
- Open Issues: 5
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
- awesome-aws-security - AWS Security Automation - Collection of scripts and resources for DevSecOps and Automated Incident Response Security (Tools of Trade)
- awesome-security-collection - **370**星
README
# aws-security-automation
Collection of scripts and resources for DevSecOps, Security Automation and Automated Incident Response Remediation## IAM Access Denied Responder
This example solution will setup an automated response to an access denied event that occurs within a CloudTrail event, a Failed authentication attempt to the AWS console, or a Client.UnauthorizedOperation event occurs.
## EC2 Auto Clean Room Forensics
This example solution will take an instance ID from an SNS topic and through a series of AWS Lambda functions co-ordinated by AWS Step Functions will automatically notify, isolate and run basic forensics on the identified instance.
## CloudTrailRemediation
Demo script to automatically restart CloudTrail. The script have placeholders for forensics etc. to avoid enabling CloudTrail without finding the causing user.## force-user-mfa
Demo script to automatically create and attach virtual MFA to any newly created IAM user. The use can fetch the MFA Seed themselves using AWS CLI.***
Copyright 2016 Amazon.com, Inc. or its affiliates. All Rights Reserved.
Licensed under the Apache License, Version 2.0 (the "License"). You may not use this file except in compliance with the License. A copy of the License is located at
http://aws.amazon.com/apache2.0/
or in the "license" file accompanying this file. This file is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License.