AWS Security Automation Logo

AWS Security Automation

0
Free
Visit Website

Collection of scripts and resources for DevSecOps, Security Automation and Automated Incident Response Remediation. IAM Access Denied Responder: This example solution will setup an automated response to an access denied event that occurs within a CloudTrail event, a Failed authentication attempt to the AWS console, or a Client.UnauthorizedOperation event occurs. EC2 Auto Clean Room Forensics: This example solution will take an instance ID from an SNS topic and through a series of AWS Lambda functions co-ordinated by AWS Step Functions will automatically notify, isolate and run basic forensics on the identified instance. CloudTrailRemediation: Demo script to automatically restart CloudTrail. The script have placeholders for forensics etc. to avoid enabling CloudTrail without finding the causing user. force-user-mfa: Demo script to automatically create and attach virtual MFA to any newly created IAM user. The use can fetch the MFA Seed themselves using AWS CLI. Copyright 2016 Amazon.com, Inc. or its affiliates. All Rights Reserved. Licensed under the Apache License, Version 2.0 (the 'License'). You may not use this file except in compliance with the License. A copy

FEATURES

ALTERNATIVES

Dispatch helps manage security incidents by integrating with existing tools and automating incident response tasks.

Dropzone AI is an autonomous AI agent for SOCs that performs end-to-end investigations of security alerts, integrating with existing cybersecurity tools and data sources.

CrowdStrike Falcon Orchestrator is a Windows-based application for workflow automation and security response.

Anomali is an AI-Powered Security Operations Platform that delivers speed, scale, and performance at a reduced cost, combining ETL, SIEM, XDR, SOAR, and TIP to detect, investigate, respond, and remediate threats.

A modular incident response framework in Powershell that uses Powershell Remoting to collect data for incident response and breach hunts.

Fast suspicious file finder for threat hunting and live forensics.

Check if your email address has been involved in a data breach.

A panic button app for triggering a ripple effect across apps responding to panic events

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved