DataCop is a custom AWS framework that mitigates S3 bucket attack vectors based on customer configuration. By default, this framework relies on AWS Macie results to automatically block S3 buckets that contain PII or any classified information. However, this framework supports the following third party services: Trend Micro CloudOne File Storage Security (FSS). Features: - Automatically provisioned infrastructure with AWS CDK - Configurable settings for bucket blocking for Macie and FSS - Event-driven S3 bucket blocking - Highly scalable and extensible Setup & Installation Requirements: In order to install and deploy DataCop, you need to ensure that you have Python 3.8+ installed. Installation: The installation process for DataCop is fairly straightforward. Please follow the steps outlined below: 1. Configure your config.ini file. This file is EXTREMELY IMPORTANT, and it must be filled out properly before you deploy DataCop. An example of the file with an explanation of the key/value pairs can be found in the documentation.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
CLI tool for deleting AWS resources in bulk with inspecting functionality.
Cloud Security Suite (cs-suite) - Version 3.0 Usage for cloud security audits on AWS, GCP, Azure, and DigitalOcean.
A search engine for open Amazon S3 buckets and their contents, allowing users to search for files using keywords, filename extensions, and full path.
Docker's Actuary automates security best-practices checks for Docker containers.
A collection of security workshops and hands-on content for AWS security services and techniques
A cloud native application protection platform that provides security monitoring and protection across cloud, on-premises, and hybrid environments.
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.