Security Response Automation Logo

Security Response Automation

0
Free
Visit Website

Automated actions on Security Command Center findings: automatically create disk snapshots, revoke IAM grants, notify other systems, and more. Service account runs with lowest permission needed granted at granularity you specify. Every action is logged to Cloud Logging and is easily auditable. Can be run in monitor mode where actions are logged only. Architecture: A finding is either generated from Security Command Center or Cloud Logging (legacy) and sent to a Pubsub topic. The Filter Cloud Function first can optionally run the finding through a series of Rego policies that will automatically mark the finding as a false positive and auto-close it. If the finding is valid for your environment, it is sent to the Router Function, which is configued by YAML to send the finding on to the correct auto-remediation function that you have enabled. The auto-remediation Cloud Functions

FEATURES

ALTERNATIVES

Cloud Security Suite (cs-suite) - Version 3.0 Usage for cloud security audits on AWS, GCP, Azure, and DigitalOcean.

Kube-bench is a tool for checking Kubernetes security based on CIS Kubernetes Benchmark.

Comprehensive set of security controls for various AWS services to ensure a secure cloud environment.

A framework to analyze container images and gather useful information.

A tool to enumerate S3 buckets for a specific target

Open-source policy-as-code software for multi-cloud and SaaS environments with GPT model conversations and custom analysis policies.

A set of tools for fingerprinting and exploiting Amazon cloud infrastructures

A tool to fetch all public IP addresses associated with an AWS account

PINNED