AWS Auto Remediate Logo

AWS Auto Remediate

0
Free
Visit Website

The Auto Remediate function is triggered via an SQS Queue auto-remediate-config-compliance. The SQS Queue is populated with a compliance payload from AWS Config via a CloudWatch Event auto-remediate-config-compliance. The purpose of the CloudWatch Event is to filter out all non-compliance related messages that AWS Config generates. Once the Lambda function has been triggered it will attempt to remediate the security concern. If the remediation was unsuccessful, the event payload will be sent to the dead letter queue (DQL) SQS Queue auto-remediate-dlq. Each time a payload is sent to the DLQ, an attribute try_count is incremented to the SQS message. Once that count exceeds RETRYCOUNT variable attached to the Lambda Function, the message will no longer be sent to the DLQ. If no remediation exists for the incoming AWS Config event, the AWS Config payload will be sent to an SNS Topic.

FEATURES

ALTERNATIVES

Automated tool for scripting complex sequences in cybersecurity frameworks.

TheHive is a case management platform for security operations teams that facilitates incident response, threat analysis, and team collaboration.

A pentest management platform that automates reporting workflows, provides client collaboration tools, and streamlines the entire penetration testing lifecycle from scoping to remediation.

A remediation orchestration platform that consolidates security alerts, automates triage, and streamlines the remediation process across hybrid environments.

Catalyst is a SOAR system that automates alert handling and incident response processes, adapting to your workflows and being open source.

Tool to disable vulnerable features in Windows and popular applications for enhanced security.

Open-source, free, and scalable cyber threat intelligence and security incident response solution with improved performance and new features.

A mature SIEM environment is critical for successful SOAR implementation.

PINNED