aws-well-architected-labs
ScoutSuite
aws-well-architected-labs | ScoutSuite | |
---|---|---|
4 | 24 | |
1,948 | 6,176 | |
0.7% | 1.2% | |
7.1 | 4.9 | |
19 days ago | 12 days ago | |
Python | Python | |
Apache License 2.0 | GNU General Public License v3.0 only |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
aws-well-architected-labs
-
AWS costs every programmer should know (2019)
AZs are connected via normal user visible networks, you can just break those. They even provide examples, https://github.com/awslabs/aws-well-architected-labs/tree/ma...
Those are basic (don't cover flapping or glacial-speed slowdown degradation modes etc) but a starting point at least.
-
Recommend Open Source Terraform Code deploying Azure / AWS / GCP - For me to read and learn
read up on aws well architected framework and you'll find github/gitlab code for terraform to follow this structure https://rst.software/blog/2020/08/the-5-pillars-of-the-aws-well-architected-framework-i-operational-excellence/ https://github.com/awslabs/aws-well-architected-labs
- awslabs/aws-well-architected-labs: Hands on labs and code to help you learn, measure, and build using architectural best practices.
-
Best practice and cost optimization
AWS Well architected labs: https://github.com/awslabs/aws-well-architected-labs
ScoutSuite
-
Azure and M365 Secure Config Review
Prowler and ScoutSuite are a good start for cloud stuff.
-
Open source alternative cloud security tool that works like Wiz/Lacework/Aqua
Another solution might be ScoutSuite, they have support for all major clouds - aws,gcp and azure. But its probably not maintained as well. ScoutSuite
- CSPM opensource suggestions
-
Creating a jump host in 2023
If you're planning to use Active Directory and/or Azure AD, run ADRecon/AzureADRecon and Bloodhound frequently and review in depth. Run ScoutSuite frequently and review as part of a normal operational cycle (e.g., at weekly team meetings make the results available and set aside 15 minutes to discuss and make assignments). Look critically at where these three tools overlap within two or three degrees of separation from your jump hosts (e.g., hosts/nodes that are one or two devices away and users/security groups that are one or two devices away) for help prioritizing when you have too many high-risk/high-impact items to look through.
-
How to do AWS security assesment?
https://github.com/nccgroup/ScoutSuite (I used it for GCP one time, but I can't say if it good for AWS)
- Scanning for AWS Security Issues with Trivy
-
Automated penetration testing for a cloud infrastructure
I'd take a look at ScoutSuite. It runs on your infra and spits back a remarkably readable report.
- Pentesting
-
AWS Security Checklist
If you could get a read-only (audit?) account you could use ScoutSuite to pull the accounts and review them: https://github.com/nccgroup/ScoutSuite
-
This Week in Python
ScoutSuite – Multi-Cloud Security Auditing Tool
What are some alternatives?
pacu - The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.
prowler - Prowler is an Open Source Security tool for AWS, Azure, GCP and Kubernetes to do security assessments, audits, incident response, compliance, continuous monitoring, hardening and forensics readiness. Includes CIS, NIST 800, NIST CSF, CISA, FedRAMP, PCI-DSS, GDPR, HIPAA, FFIEC, SOC2, GXP, Well-Architected Security, ENS and more
cloudsploit - Cloud Security Posture Management (CSPM)
bless - Repository for BLESS, an SSH Certificate Authority that runs as a AWS Lambda function
Scout2 - Security auditing tool for AWS environments
chaostoolkit - Chaos Engineering Toolkit & Orchestration for Developers
siem-on-amazon-opensearch-service - A solution for collecting, correlating and visualizing multiple types of logs to help investigate security incidents.
kubestriker - A Blazing fast Security Auditing tool for Kubernetes
handbook.vantage.sh - The Cloud Cost Handbook is a free, open-source, community-supported set of guides meant to help explain often-times complex pricing of public cloud infrastructure and service providers in plain english.
cloud-custodian - Rules engine for cloud security, cost optimization, and governance, DSL in yaml for policies to query, filter, and take actions on resources