AWS Config Rules Repository Logo

AWS Config Rules Repository

0
Free
Visit Website

AWS Community repository of custom Config rules. Contributions welcome. Instructions for leveraging these rules are below. Please review each rule carefully and test within your dev/test environment before integrating into production. Getting started with the development of AWS Config Rules See the CONTRIBUTING.md. Related Projects: RDK (Rule Development Kit) - https://github.com/awslabs/aws-config-rdk RDKLib (Library to run rules at scale) - https://github.com/awslabs/aws-config-rdklib Config Rules Engine (Deploy and manage Rules at scale) - https://github.com/awslabs/aws-config-engine-for-compliance-as-code Deploy one of the Config rules of this repo. Whenever the rules are created with RDK, you can leverage the RDK tool to deploy the rule in your AWS account. You can spot those rules by the fact that 1) they have their own directory, and 2) there is a parameters.json file. With the RDK: In your working folder, git clone https://github.com/awslabs/aws-config-rules cd python rdk deploy NAME_OF_THE_RULE Manually: You can use the sample functions in this repository to create Config rules that evaluate the configuration settings of your AWS resources.

FEATURES

ALTERNATIVES

Workflows for Shuffle automation tool with structured categories and customization options.

A proof of concept for using the SSM Agent in Fargate for incident response

An open-source, drag-and-drop security workflow builder with integrated case management for automating security workflows and tackling alert fatigue.

StackStorm is an open-source automation platform that connects and automates DevOps workflows and integrates with existing infrastructure.

A public incident response process documentation used at PagerDuty

Dropzone AI is an autonomous AI agent for SOCs that performs end-to-end investigations of security alerts, integrating with existing cybersecurity tools and data sources.

A Live Response collection script for Incident Response that automates the collection of artifacts from various Unix-like operating systems.

A remediation orchestration platform that consolidates security alerts, automates triage, and streamlines the remediation process across hybrid environments.