All Projects → aws-samples → aws-customer-playbook-framework

aws-samples / aws-customer-playbook-framework

Licence: other
This repository provides sample templates for security playbooks against various scenarios when using Amazon Web Services.

Projects that are alternatives of or similar to aws-customer-playbook-framework

Docker-Templates
Docker configurations for TheHive, Cortex and 3rd party tools
Stars: ✭ 71 (+65.12%)
Mutual labels:  incident-response
awesome-incident-response-pro-bono
This repository is a curated list of pro bono incident response entities.
Stars: ✭ 16 (-62.79%)
Mutual labels:  incident-response
ir scripts
incident response scripts
Stars: ✭ 17 (-60.47%)
Mutual labels:  incident-response
PSTrace
Trace ScriptBlock execution for powershell v2
Stars: ✭ 38 (-11.63%)
Mutual labels:  incident-response
training-materials
No description or website provided.
Stars: ✭ 47 (+9.3%)
Mutual labels:  incident-response
wazuh-cloudformation
Wazuh - Amazon AWS Cloudformation
Stars: ✭ 32 (-25.58%)
Mutual labels:  incident-response
wazuh-ansible
Wazuh - Ansible playbook
Stars: ✭ 166 (+286.05%)
Mutual labels:  incident-response
wazuh-puppet
Wazuh - Puppet module
Stars: ✭ 25 (-41.86%)
Mutual labels:  incident-response
GDPatrol
A Lambda-powered Security Orchestration framework for AWS GuardDuty
Stars: ✭ 50 (+16.28%)
Mutual labels:  incident-response
catalyst
Catalyst is an open source SOAR system that helps to automate alert handling and incident response processes
Stars: ✭ 91 (+111.63%)
Mutual labels:  incident-response
Evilize
Parses Windows event logs files based on SANS Poster
Stars: ✭ 24 (-44.19%)
Mutual labels:  incident-response
Simple-Live-Data-Collection
Simple Live Data Collection Tool
Stars: ✭ 22 (-48.84%)
Mutual labels:  incident-response
compliance
Legal, procedural and policies document templates for operating an IRT
Stars: ✭ 57 (+32.56%)
Mutual labels:  incident-response
LinuxCatScale
Incident Response collection and processing scripts with automated reporting scripts
Stars: ✭ 143 (+232.56%)
Mutual labels:  incident-response
CASE
Cyber-investigation Analysis Standard Expression (CASE) Ontology
Stars: ✭ 46 (+6.98%)
Mutual labels:  incident-response
uac
UAC is a Live Response collection script for Incident Response that makes use of native binaries and tools to automate the collection of AIX, Android, ESXi, FreeBSD, Linux, macOS, NetBSD, NetScaler, OpenBSD and Solaris systems artifacts.
Stars: ✭ 260 (+504.65%)
Mutual labels:  incident-response
gsvsoc cirt-playbook-battle-cards
Cyber Incident Response Team Playbook Battle Cards
Stars: ✭ 142 (+230.23%)
Mutual labels:  incident-response
YAFRA
YAFRA is a semi-automated framework for analyzing and representing reports about IT Security incidents.
Stars: ✭ 22 (-48.84%)
Mutual labels:  incident-response
fastfinder
Incident Response - Fast suspicious file finder
Stars: ✭ 116 (+169.77%)
Mutual labels:  incident-response
incident-response-plan-template
A concise, directive, specific, flexible, and free incident response plan template
Stars: ✭ 288 (+569.77%)
Mutual labels:  incident-response

Playbooks

The contents of this library are provided for informational purposes only. It represents the current product offerings and practices from Amazon Web Services (AWS) as of the date of issue of this document, which are subject to change without notice. Customers are responsible for making their own independent assessment of the information in this document and any use of AWS products or services, each of which is provided “as is” without warranty of any kind, whether express or implied. This document does not create any warranties, representations, contractual commitments, conditions, or assurances from AWS, its affiliates, suppliers, or licensors. The responsibilities and liabilities of AWS to its customers are controlled by AWS agreements, and this document is not part of, nor does it modify, any agreement between AWS and its customers.

© 2021 Amazon Web Services, Inc. or its affiliates. All Rights Reserved. This work is licensed under a Creative Commons Attribution 4.0 International License.

This AWS Content is provided subject to the terms of the AWS Customer Agreement available at http://aws.amazon.com/agreement or other written agreement between the Customer and either Amazon Web Services, Inc. or Amazon Web Services EMEA SARL or both.

What this Repository Is

This collections of files is provided as an example framework for customers to create, develop, and integrate security playbooks in preparation for potential attack scenarios when using AWS services.

Was ist dieses Repository

Diese Dateisammlung wird als Beispiel für Kunden bereitgestellt, um Sicherheits-Playbooks zu erstellen, zu entwickeln und zu integrieren, um sich auf mögliche Angriffsszenarien bei der Nutzung von AWS-Services vorzubereiten. Spielbücher in spanischer Sprache befinden sich hier

Qué es este repositorio

Esta colección de archivos se proporciona como un marco de ejemplo para que los clientes creen, desarrollen e integren guías de seguridad a fin de prepararse para posibles situaciones de ataque al utilizar los servicios de AWS. Los libros de jugadas en español se encuentran aquí

Qu'est-ce que ce dépôt

Ces collections de fichiers sont fournies à titre d'exemple de cadre permettant aux clients de créer, de développer et d'intégrer des playbooks de sécurité en vue de scénarios d'attaque potentiels lors de l'utilisation des services AWS. Les playbooks en espagnol se trouvent ici

このリポジトリとは何か

このファイルのコレクションは、AWS のサービスを使用する際の潜在的な攻撃シナリオに備えて、セキュリティプレイブックを作成、開発、統合するためのフレームワークの例として提供されています。スペイン語のプレイブックはこちら

这个仓库是什么

这些文件集是作为示例框架提供的,供客户创建、开发和集成安全行动手册,为使用 AWS 服务时的潜在攻击场景做好准备。西班牙语剧本位于此处

Contributing to the Incident Response Playbooks

Impostor Syndrome Disclaimer

Before we get into the details: We want your help. No, really.

There may be a little voice inside your head that is telling you that you're not ready to contribute to playbooks; that your skills aren't nearly good enough to contribute. What could you possibly offer a project like this one? We assure you -- the little voice in your head is wrong. If you can write code at all or have experience with incident response, then we need your contributions! Writing perfect playbooks isn't the measure of a good responder (that would disqualify all of us!); it's trying to create something, making mistakes, and learning from those mistakes. That's how we all improve.

We've provided a clear playbook creation guide. This outlines the process that you'll need to follow to get a playbook developed and approved for use with Ziplines. By making expectations and process explicit, we hope it will make it easier for you to contribute. And you don't just have to write code. You can help out by writing documentation, tests, or even by giving feedback about this work. (And yes, that includes giving feedback about everything in this README)

Playbook Index

Preparation

Administrative

Communications

Response Scenarios

100-200 Level Scenarios

300-400 Level Scenarios

AWS Analysis Tools

References

Security

See CONTRIBUTING for more information.

License Summary

The documentation is made available under the Creative Commons Attribution-ShareAlike 4.0 International License. See the LICENSE file.

The sample code within this documentation is made available under the MIT-0 license. See the LICENSE-SAMPLECODE file.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].