Skip to content
You signed in with another tab or window. to refresh your session.
You signed out in another tab or window. to refresh your session.
You switched accounts on another tab or window. to refresh your session.
Here are
33 public repositories
matching this topic...
π ElectricEye
ElectricEye is a multi-cloud, multi-SaaS Python CLI tool for Asset Management, Security Posture Management & Attack Surface Monitoring supporting 100s of services and evaluations to harden your CSP & SaaS environments with controls mapped to over 20 industry, regulatory, and best practice controls frameworks
A collection of lambda functions to collect data from Cloudwatch, Kinesis, VPC Flow logs, S3, security-hub and AWS Inspector
Code examples for the AWS Security Blog post: How to use CI/CD to deploy and configure AWS security services with Terraform
π dev-sec-ops
Advanced AWS Security Automation Resources: Used by Udemy Course π
Proof of Value Terraform Scripts to utilize Amazon Web Services (AWS) Security, Identity & Compliance Services to Support your AWS Account Security Posture.
Configure and deploy AWS Security Hub.
control-controls control controls of AWS Security Hub across all regions.
AWS Security Hub automatic suppression rules
AWS native Static Application Security Testing (SAST) utility to find and eradicate vulnerable software packages stored in AWS CodeArtifact. Built for both real-time distributed and centralized deployments.
AWS Fargate and Prowler to send AWS service security configuration findings to Security Hub to Automate Compliance Checks for AWS CIS Benchmarks
An AWS Security Hub Custom Findings provider, using the Have I Been Pwned API
π aurora-activity-streams-sechub
Analyse database activity with Aurora Database Activity Streams and send findings to Security Hub
π‘οΈ Terraform module to provision multi-region AWS cloud security controls
Terraform module to update AWS securityhub findings such as suppressions
An AWS Security Hub Custom Findings provider, using the Have I Been Pwned API
Security & Privacy hub (website).
Process AWS Security Hub v2 (OCSF) findings with auto-suppression rules, filtering, and optional Slack alerts
AWS Organization baseline configuration
Sample demonstrating how to use AWS Systems Manager Inventory to detect file changes on EC2 instances and publish findings to AWS Security Hub and Amazon Security Lake.
Detect and automate responses to Kubernetes privilege escalation risks in AWS EKS. Mapped to NIST 800-53, CIS Controls, and ISO 27001 using AWS-native services.
Improve this page
Add a description, image, and links to the
security-hub
topic page so that developers can more easily learn about it.
Curate this topic
Add this topic to your repo
To associate your repository with the
security-hub
topic, visit your repo's landing page and select "manage topics."
Learn more
You canβt perform that action at this time.