INCIDENTS
Web-based tool for incident response with easy local installation using Docker.
The Auto Remediate function is triggered via an SQS Queue auto-remediate-config-compliance. The SQS Queue is populated with a compliance payload from AWS Config via a CloudWatch Event auto-remediate-config-compliance. The purpose of the CloudWatch Event is to filter out all non-compliance related messages that AWS Config generates. Once the Lambda function has been triggered it will attempt to remediate the security concern. If the remediation was unsuccessful, the event payload will be sent to the dead letter queue (DQL) SQS Queue auto-remediate-dlq. Each time a payload is sent to the DLQ, an attribute try_count is incremented to the SQS message. Once that count exceeds RETRYCOUNT variable attached to the Lambda Function, the message will no longer be sent to the DLQ. If no remediation exists for the incoming AWS Config event, the AWS Config payload will be sent to an SNS Topic.
Web-based tool for incident response with easy local installation using Docker.
A defense-in-depth security automation and monitoring framework utilizing threat intelligence, machine learning, and serverless technologies.
An open-source SOAR tool for automating threat and incident response workflows using CACAO security playbooks.
Scalable, cost-effective application recovery to AWS.
Collection of scripts and resources for DevSecOps, Security Automation and Automated Incident Response Remediation.
A Live Response collection script for Incident Response that automates the collection of artifacts from various Unix-like operating systems.