- Added CloudShell entitlements to all roles
- Not applicable
- Not applicable
- added to simulation folder scripts to remove resources created by simulation
- Not applicable
- Comments added to simulation scripts
- CloudFormation parameter changed to accept IAM User or Role as the principal to assume Security role
- Typo with
aws s3 rb
command results
- Added ReadOnlyAccess permissions to SecurityDeployRole
- Added IAM entitlements required to run playbook
- Added cloudshell and cloudformation permissions to SecurityDeployRole
- Removed GuardDuty
- Removed GuardDuty IAM Policy statement
- Policy change for Deploy Role
- Removed unnecessary code comments
- Playbook grammar and syntax fixes
- CloudTrail logging to S3 bucket
- VPC Flow logging to S3 Bucket
- DNS logging to S3 Bucket
- GuardDuty enabled
- Athena Workgroup
- Glue database and tables for all log types
- IAM Role for Athena administration
- IAM Role for security analyst to use Athena
- IAM User Access Keys for crypto mining playbook simulation
- IAM User Access Keys for exposed credential playbook simulation
- Credential exposure
- Crypto mining
- Template