An automatically deployed event monitoring and analyses solution for the AWS Cloud.
-
Updated
May 9, 2022 - Shell
An automatically deployed event monitoring and analyses solution for the AWS Cloud.
Automate AWS CloudTrail Deployment for S3 Bucket with Terraform. CloudTrail helps you manage the administration, compliance and operational control of your S3 Bucket.
CloudTrail custom alarms
Functions to Alert and Remediate AWS Security Findings
CIS Amazon Web Services Foundations Benchmark: Check CloudTrail is enabled for "ALL" region capturing all types of Management Events
Example code snippets for AWS CloudTrail Event History Poisoning to Evade Attribution
AWS CloudTrail Hands-on Lab
Terraform component for AWS CloudTrail
This project demonstrates how to ensure data security and compliance with industry regulations. This includes the use of AWS IAM for access control, AWS KMS for data encryption, Amazon Macie for sensitive data discovery and classification, and AWS CloudTrail for logging and auditing.
S3 notification examples
Creating an audit table for a DynamoDB table using CloudTrail, Kinesis Data Stream, Lambda, S3, Glue and Athena and CloudFormation
Terraform module to automate the aws cloudtrail to s3 bucket
Set up AWS Cloudtrail, optionally passing in S3 bucket for logs
CloudTrail Event Notifications
This is a script to export logs from AWS CloudTrail to a local file.
Terraform module for monitoring AWS instances in Splunk
A Terraform module to create an Amazon Web Services (AWS) CloudTrail Trail.
Jupyter notebook for investigating CloudTrail latency using Athena and matplotlib.
Add a description, image, and links to the aws-cloudtrail topic page so that developers can more easily learn about it.
To associate your repository with the aws-cloudtrail topic, visit your repo's landing page and select "manage topics."