Automated AWS Organizations configuration for security operations
-
Updated
May 20, 2024 - Python
Automated AWS Organizations configuration for security operations
This solution establishes an automated event driven workflow for notifying and auto-remediating sensitive data findings from Amazon Macie. Human interaction is via ChatOps style integration with Slack.
Sample code to discover financial data in S3 using Amazon Macie and automatically apply lifecycle policies
Use AI/ML and pattern matching to identify and protect sensitive data in AWS
Repo contains all source code and Cloudformation templates for Macie DynamoDB blog located here https://aws.amazon.com/blogs/security/detecting-sensitive-data-in-dynamodb-with-macie/
A terraform module to create the handshake role needed by macie and then to setup the account as a member of your macie master
Terraform code to process a stream from a Discord server, and process it with AWS Macie to identify personally identifiable information.
Add a description, image, and links to the macie topic page so that developers can more easily learn about it.
To associate your repository with the macie topic, visit your repo's landing page and select "manage topics."