zoph-io/aws-security-survival-kit
Bare minimum AWS Security Alerting and Configuration
MakefileGPL-3.0
Issues
- 1
imdsv2-default-new-instance-launches (Regional)
#27 opened by z0ph - 3
A list of actions that needs attention
#26 opened by z0ph - 0
Full Integration with AWS ChatBot (Teams + Slack)
#22 opened by z0ph - 0
Better Dashboarding Capabilities (Observability)
#23 opened by z0ph - 0
Feature flag / cherry-pick of alerting
#24 opened by z0ph - 0
Add New detections based on a blog post from Datadog
#25 opened by z0ph - 8
Ideas for later
#14 opened by z0ph - 2
- 1
Better SNS Message (Input Transformation)
#20 opened by z0ph - 1
Default Host Management Configuration
#15 opened by z0ph - 8
Data theft techniques
#16 opened by z0ph - 4
Add a License
#11 opened by StevenSmiley - 2
Multi-Account Support
#3 opened by gvwalker - 0
Add Custom CloudWatch Dashboard
#4 opened by z0ph - 3
N00b question: How to find the actual "Unauthorized API Call" that triggered the alarm
#6 opened by peterflat - 0
Monitor launch of IMDSv1 Instances.
#5 opened by z0ph - 1
CloudWatch Log Group does not get created automatically with CloudFormation Template
#1 opened by vladraul86