Developing 100% of the development for this is done using Makefile and docker. Get started by running make test in order to verify that all the unit tests work on your machine. To Do: Generate presigned urls to evidence loaded to s3. Reduce scope of IAM roles further for steps in the step-function. Improve integration test coverage. Improve unit test coverage. References: Jicowan original work on SSM Agent in Fargate Link to SEC318 - Coming Soon Slides from SEC318 - Coming Soon
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
Tool to disable vulnerable features in Windows and popular applications for enhanced security.
Dropzone AI is an autonomous AI agent for SOCs that performs end-to-end investigations of security alerts, integrating with existing cybersecurity tools and data sources.
Companion repository for deploying osquery in a production environment with tailored query packs.
An investigative analytics platform that uses machine learning to fuse and analyze data from multiple sources, enabling security organizations to extract insights and identify patterns for threat prevention and complex investigations.
Network Intelligence is a cybersecurity services provider offering comprehensive security solutions through their ADVISE framework, including detection and response, compliance, data privacy, and secure digital transformation services across multiple industries.
CrowdStrike Falcon Orchestrator is a Windows-based application for workflow automation and security response.
A security operations platform that provides automated threat detection, access control, and protection against various online attacks through Cloudflare integration.
npm security team foils plot to steal $13 million in cryptocurrency
Automate security incident handling and facilitate real-time activities of incident handlers.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.