Automated AWS Organizations configuration for security operations
-
Updated
Dec 23, 2024 - Python
Automated AWS Organizations configuration for security operations
This solution establishes an automated event driven workflow for notifying and auto-remediating sensitive data findings from Amazon Macie. Human interaction is via ChatOps style integration with Slack.
Sample code to discover financial data in S3 using Amazon Macie and automatically apply lifecycle policies
Use AI/ML and pattern matching to identify and protect sensitive data in AWS
Repo contains all source code and Cloudformation templates for Macie DynamoDB blog located here https://aws.amazon.com/blogs/security/detecting-sensitive-data-in-dynamodb-with-macie/
The AWS S3 Bucket Auditor is a Go-based command-line tool that performs a comprehensive security audit of your Amazon S3 buckets. It integrates with AWS Macie to check for sensitive data, providing intelligent insights while ensuring data privacy and security.
Hands on example on using AWS Macie service for enhanced data privacy
Terraform code to process a stream from a Discord server, and process it with AWS Macie to identify personally identifiable information.
A terraform module to create the handshake role needed by macie and then to setup the account as a member of your macie master
Add a description, image, and links to the macie topic page so that developers can more easily learn about it.
To associate your repository with the macie topic, visit your repo's landing page and select "manage topics."