AWS Auto Remediate Logo

AWS Auto Remediate

0
Free
Visit Website

The Auto Remediate function is triggered via an SQS Queue auto-remediate-config-compliance. The SQS Queue is populated with a compliance payload from AWS Config via a CloudWatch Event auto-remediate-config-compliance. The purpose of the CloudWatch Event is to filter out all non-compliance related messages that AWS Config generates. Once the Lambda function has been triggered it will attempt to remediate the security concern. If the remediation was unsuccessful, the event payload will be sent to the dead letter queue (DQL) SQS Queue auto-remediate-dlq. Each time a payload is sent to the DLQ, an attribute try_count is incremented to the SQS message. Once that count exceeds RETRYCOUNT variable attached to the Lambda Function, the message will no longer be sent to the DLQ. If no remediation exists for the incoming AWS Config event, the AWS Config payload will be sent to an SNS Topic.

FEATURES

ALTERNATIVES

A security operations platform that provides automated threat detection, access control, and protection against various online attacks through Cloudflare integration.

Collection of scripts and resources for DevSecOps, Security Automation and Automated Incident Response Remediation.

A defense-in-depth security automation and monitoring framework utilizing threat intelligence, machine learning, and serverless technologies.

WALKOFF is an automation framework for integrating capabilities and devices to streamline tasks.

A cybersecurity incident management platform for tracking and reporting incidents with agility and speed.

Incident response framework focused on remote live forensics

Request Tracker for Incident Response (RTIR) is a tool for incident response teams to manage incident reports, correlate data, and facilitate communication.

A DFIR Playbook Spec based on YAML for collaborative incident response processes.