Example code snippets for AWS CloudTrail Event History Poisoning to Evade Attribution
-
Updated
Oct 1, 2022 - Python
Example code snippets for AWS CloudTrail Event History Poisoning to Evade Attribution
Events Detection with EventBridge and Lambda
Automatic Multi-Cloud Resource Tagging for Cost Allocation and Ownership Tracking
This Lambda function Start Logging Cloud Trail if it Stopped Logging and sends logs to CloudWatch Log group.
An Elastic beat for cloudtrail w/ S3 -> SNS -> SQS
This is a script to export logs from AWS CloudTrail to a local file.
Sending cloudtrail logs from s3 to AWS Elasticsearch using Lambda
Terraform project to setup the AWS account structure with state and roles
trail-digger is a tool for digging trail log files of AWS CloudTrail.
Terraform module to create Lambda resource on AWS for sending notification when anything done from console in AWS.
Terraform module to create an Secure Basline, inclued module is alarm baseline, config baseline, and clouddtrail baseline.
Automate the daily partitioning of your CloudTrail bucket in Athena
Easily export AWS CloudTrail events to ElasticSearch
Adaptive AWS Zero Trust Policy made easy: Auto-generate least-privilege policies based on user activity in real time! Accelerate the adoption of smart access control
Glue scripts for converting AWS Service Logs for use in Athena
Automatically tag AWS resources on creation, for cost assignment
Add a description, image, and links to the cloudtrail-logs topic page so that developers can more easily learn about it.
To associate your repository with the cloudtrail-logs topic, visit your repo's landing page and select "manage topics."