Terraform module to provision an AWS Cloudtrail.
-
Updated
Jun 28, 2023 - HCL
Terraform module to provision an AWS Cloudtrail.
Visualise interaction between AWS services using CloudTrail logs
Reflex rule to detect the stopping of CloudTrail logging for a trail
opensearch-alerts for threat detection and incident response
Collect AWS CloudTrail logs using Cribl LogStream. Use this pack to optimize your CloudTrail events and send relevant events into your logging or SIEM solution.
Some example GorillaStack Terraform templates to help you get started
Rule to detect when a CloudTrail trail has been deleted.
CloudTrail custom alarms
Format your logs, and make them pretty. AWS CloudTrail Athena pretty logs
Rule to detect when a CloudTrail trail has been created or updated without encryption.
AWS Lambda function for alerting to Slack when any changes are made to Security Groups
The Page will have Contents about AWS Concepts and Linux
This project aims to audit and analyze S3 bucket access using AWS CloudTrail, ElasticSearch, and Node.js Express. It includes processes for sending audit logs to another S3 bucket, ingesting logs into ElasticSearch, creating visualizations in Kibana, and building an API to query top source IPs for PutObject requests
AWS Config and Security Hub demo
To check how CloudTrail records when a Cognito authorized user create AWS resources
Automate AWS CloudTrail Deployment for S3 Bucket with Terraform. CloudTrail helps you manage the administration, compliance and operational control of your S3 Bucket.
Add a description, image, and links to the cloudtrail topic page so that developers can more easily learn about it.
To associate your repository with the cloudtrail topic, visit your repo's landing page and select "manage topics."