aws-security-survival-kit
device_google_taimen
aws-security-survival-kit | device_google_taimen | |
---|---|---|
3 | 1 | |
438 | 3 | |
1.1% | - | |
6.0 | 1.5 | |
about 1 month ago | over 2 years ago | |
Makefile | Makefile | |
GNU General Public License v3.0 only | - |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
aws-security-survival-kit
-
Incident 2 – Additional details of the attack
This actually makes me feel better (overall) about Lastpass! as a company. That they can go into some detail shows confidence and an openness that I didn't previously experience. That said, their admission that they have lots of old credentials lying around is not good. Most of the things they changed have been pretty standard AWS recommendations for years now.
Side note, as a DevOps engineer this article does give me some additional pause in my everyday work. I try very hard to keep "work" relegated to my work computer and "home" stuff relegated to my home computer(s). However, sometimes the two do meet; generally when testing something. The upside is that I'm going to (try to) be a bit more careful in the future. I'm also going to install some additional AWS checks/balances on my accounts[0], just to make sure.
[0] https://github.com/zoph-io/aws-security-survival-kit
- aws-security-survival-kit
- AWS Security Survival Kit: Bare-minimum security alerting
device_google_taimen
-
Pixel 2 XL image file
I found the following resource (https://github.com/GrapheneOS-Archive/device_google_taimen) but I don't know if this is any help to me because no ready-made image files are to be found here.
What are some alternatives?
matano - Open source security data lake for threat hunting, detection & response, and cybersecurity analytics at petabyte scale on AWS
Vanadium - Privacy and security enhanced releases of Chromium for GrapheneOS. Vanadium provides the WebView and standard user-facing browser on GrapheneOS. It depends on hardening in other GrapheneOS repositories and doesn't include patches not relevant to the build targets used on GrapheneOS.
osquery-defense-kit - Production-ready detection & response queries for osquery
k8s-deployment - Reconmap Kubernetes deployment files
Auditor - Hardware-based attestation / intrusion detection app for Android devices. It provides both local verification with another Android device via QR codes and optional scheduled server-based verification with support for alert emails. It uses hardware-backed keys and attestation support as the foundation and chains trust to the app for software checks.
helmfiles - Comprehensive Distribution of Helmfiles for Kubernetes
android_device_Unihertz_Atom_XL_EEA - Device tree for the Unihertz Atom XL EEA (european union)
platform_external_vanadium - Vanadium integration for GrapheneOS. See https://github.com/GrapheneOS/Vanadium for the Vanadium build configuration and patches.
howtheysre - A curated collection of publicly available resources on how technology and tech-savvy organizations around the world practice Site Reliability Engineering (SRE)
aws-dhmc-enabler - AWS Default Host Management Configuration (DHMC) Enabler