aws-security-survival-kit
platform_external_vanadium
aws-security-survival-kit | platform_external_vanadium | |
---|---|---|
3 | 1 | |
438 | 6 | |
0.7% | - | |
6.0 | 7.0 | |
about 1 month ago | almost 3 years ago | |
Makefile | Makefile | |
GNU General Public License v3.0 only | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
aws-security-survival-kit
-
Incident 2 – Additional details of the attack
This actually makes me feel better (overall) about Lastpass! as a company. That they can go into some detail shows confidence and an openness that I didn't previously experience. That said, their admission that they have lots of old credentials lying around is not good. Most of the things they changed have been pretty standard AWS recommendations for years now.
Side note, as a DevOps engineer this article does give me some additional pause in my everyday work. I try very hard to keep "work" relegated to my work computer and "home" stuff relegated to my home computer(s). However, sometimes the two do meet; generally when testing something. The upside is that I'm going to (try to) be a bit more careful in the future. I'm also going to install some additional AWS checks/balances on my accounts[0], just to make sure.
[0] https://github.com/zoph-io/aws-security-survival-kit
- aws-security-survival-kit
- AWS Security Survival Kit: Bare-minimum security alerting
platform_external_vanadium
What are some alternatives?
matano - Open source security data lake for threat hunting, detection & response, and cybersecurity analytics at petabyte scale on AWS
grapheneos.org - Main website servers
osquery-defense-kit - Production-ready detection & response queries for osquery
i-probably-didnt-backdoor-this - A practical experiment on supply-chain security using reproducible builds
k8s-deployment - Reconmap Kubernetes deployment files
os_issue_tracker - Issue tracker for GrapheneOS Android Open Source Project hardening work. Standalone projects like Auditor, AttestationServer and hardened_malloc have their own dedicated trackers. [Moved to: https://github.com/GrapheneOS/os-issue-tracker]
helmfiles - Comprehensive Distribution of Helmfiles for Kubernetes
bromite - Bromite is a Chromium fork with ad blocking and privacy enhancements; take back your browser!
device_google_taimen - Pixel 2 XL device sources not shared with the Pixel 2.
android_device_Unihertz_Atom_XL_EEA - Device tree for the Unihertz Atom XL EEA (european union)
howtheysre - A curated collection of publicly available resources on how technology and tech-savvy organizations around the world practice Site Reliability Engineering (SRE)