aws-security-hub
There are 26 repositories under aws-security-hub topic.
aws-solutions/automated-security-response-on-aws
Automated Security Response on AWS is an add-on solution that works with AWS Security Hub to provide a ready-to-deploy architecture and a library of automated playbooks. The solution makes it easier for AWS Security Hub customers to resolve common security findings and to improve their security posture in AWS.
aws-samples/aws-security-services-with-terraform
Code examples for the AWS Security Blog post: How to use CI/CD to deploy and configure AWS security services with Terraform
aws-samples/aws-security-hub-response-and-remediation
Pre-configured response & remediation playbooks for AWS Security Hub
aws-samples/aws-security-hub-csv-manager
CSV Manager for AWS Security Hub exports SecurityHub findings to a CSV file and allows you to mass-update SecurityHub findings by modifying that CSV file.
aws-ia/terraform-aws-security-hub
Configure and deploy AWS Security Hub.
deep-security/aws-security-hub
Send high priority Deep Security events to the AWS Security Hub
towardsthecloud/aws-cdk-landing-zone-roadmap
This is the public roadmap for the custom build AWS CDK Landing Zone solution provided by Towards the Cloud.
pepabo/control-controls
control-controls control controls of AWS Security Hub across all regions.
aws-samples/aws-security-hub-glue-aggregator-terraform
These Terraform modules aggregate Security Hub findings to centralized account using Amazon Kinesis Firehose and AWS Glue
prasanna7401/CIS-Benchmarks-AutoRemediation-in-AWS-Organization
Perform near real-time "Automatic" remediation of CIS v1.4.0 NON-COMPLIANT resources in IAM, Storage, Monitoring, Logging, and Networking in an AWS Multi-account setup using Security Hub Findings
R3DRUN3/aws-secops
aws vulnerability assessment with security hub 🛡️ 🔒
illumiolabs/illumio-security-hub-connector
This repo contains the code for Illumio security hub connector that allows customers to convert Illumio events into AWS security hub findings while enriching them with Illumio labels and EC2 metadata. It also contains the custom action AWS Lambda function to quarantine a workload
cado-security/guardduty-lambda-cado
Go straight from Guard Duty alerts to Automated Investigations in AWS with Cado Response
AdamDivall/CfCT-AWS-Security-Hub
CloudFormation Template that leverages a Custom Resource to invoke a Lambda Function that configures AWS Security Hub across the Organization. Specifically this has been designed for the purpose of implementing via Customisations for Control Tower
clouddrove/terraform-aws-security-hub
This terraform module creates set of Security hub. AWS Security Hub is a comprehensive security service that helps you centralize and automate security findings across your AWS accounts
iainelder/security-hub-controls
A scrape of the AWS Security Hub controls reference, along with a Python program to update it
jfrog/xray-aws-security-hub
JFrog Xray's integration brings Xray’s security and license violations intel inside AWS Security Hub.
AndreCoutinhom/aws_security_case
Zup e a solução de segurança para a experiência de devs
CMS-Enterprise/batcave-wt-sdl-reporting
batCAVE Security Data Lake daily reporting automation
DNXLabs/terraform-aws-securityhub
Terraform module to manage SecurityHub and alarms
epomatti/aws-config-security-hub
AWS Config and Security Hub demo
GSI-Xapiens-CSIRO/aws-landingzone-provisioning
Provisioning AWS Landing Zone with AWS CLI
Kzax01/AWS-Security-Aerosecure
AeroSecure: Where Aerospace Meets AWS Security : How to Secure an Aerospace Infra ? Let's see! 🚀☁️🔐
vincenttjia/aws-securityhub-multiaccount-security-standards-script
A simple script to help setting up SecurityHub standards cross account
4math2379/aws-security-hub-soc
AWS Security Hub SOC - Multi-account Security Hub management for Security Operations Centers
CodeUpJewell/AWS-GuardDuty-Inspector-SecurityHub-Designing-for-Security
In this project, I deploy and assess a simple web application environment’s security posture. I have a chance to test the security of the environment by simulating an attack scenario and exploiting cloud configuration vulnerabilities. Similarly, I set up monitoring to identify suspicious behavior and vulnerable configurations and will remediate the identified misconfigurations. Ultimately, I tie it all together by proposing a DevOps build pipeline that includes security best practices.