Example code snippets for AWS CloudTrail Event History Poisoning to Evade Attribution
-
Updated
Oct 1, 2022 - Python
Example code snippets for AWS CloudTrail Event History Poisoning to Evade Attribution
This Lambda function Start Logging Cloud Trail if it Stopped Logging and sends logs to CloudWatch Log group.
Events Detection with EventBridge and Lambda
Automatic Multi-Cloud Resource Tagging for Cost Allocation and Ownership Tracking
This is a script to export logs from AWS CloudTrail to a local file.
An Elastic beat for cloudtrail w/ S3 -> SNS -> SQS
Terraform project to setup the AWS account structure with state and roles
Terraform module to create Lambda resource on AWS for sending notification when anything done from console in AWS.
Terraform module to create an Secure Basline, inclued module is alarm baseline, config baseline, and clouddtrail baseline.
trail-digger is a tool for digging trail log files of AWS CloudTrail.
Automate the daily partitioning of your CloudTrail bucket in Athena
Easily export AWS CloudTrail events to ElasticSearch
Sending cloudtrail logs from s3 to AWS Elasticsearch using Lambda
Adaptive AWS Zero Trust Policy made easy: Auto-generate least-privilege policies based on user activity in real time! Accelerate the adoption of smart access control
Glue scripts for converting AWS Service Logs for use in Athena
Automatically tag AWS resources on creation, for cost assignment
Add a description, image, and links to the cloudtrail-logs topic page so that developers can more easily learn about it.
To associate your repository with the cloudtrail-logs topic, visit your repo's landing page and select "manage topics."