AWS Config Rules Repository Logo

AWS Config Rules Repository

0
Free
Visit Website

AWS Community repository of custom Config rules. Contributions welcome. Instructions for leveraging these rules are below. Please review each rule carefully and test within your dev/test environment before integrating into production. Getting started with the development of AWS Config Rules See the CONTRIBUTING.md. Related Projects: RDK (Rule Development Kit) - https://github.com/awslabs/aws-config-rdk RDKLib (Library to run rules at scale) - https://github.com/awslabs/aws-config-rdklib Config Rules Engine (Deploy and manage Rules at scale) - https://github.com/awslabs/aws-config-engine-for-compliance-as-code Deploy one of the Config rules of this repo. Whenever the rules are created with RDK, you can leverage the RDK tool to deploy the rule in your AWS account. You can spot those rules by the fact that 1) they have their own directory, and 2) there is a parameters.json file. With the RDK: In your working folder, git clone https://github.com/awslabs/aws-config-rules cd python rdk deploy NAME_OF_THE_RULE Manually: You can use the sample functions in this repository to create Config rules that evaluate the configuration settings of your AWS resources.

FEATURES

ALTERNATIVES

A Sysmon configuration repository for customizing Microsoft Sysinternals Sysmon configurations with modular setup.

Anomali is an AI-Powered Security Operations Platform that delivers speed, scale, and performance at a reduced cost, combining ETL, SIEM, XDR, SOAR, and TIP to detect, investigate, respond, and remediate threats.

npm security team foils plot to steal $13 million in cryptocurrency

Incident response and case management solution for efficient incident response and management.

Python command line utility for incident response in AWS

Open-source security automation platform for automating security alerts and building AI-assisted workflows.

Stronghold is the easiest way to securely configure your Mac.

A System for Abuse- and Incident Handling with log file analysis capabilities.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved