Dow Jones Hammer is a multi-account cloud security tool for AWS. It identifies misconfigurations and insecure data exposures within most popular AWS resources, across all regions and accounts. It has near real-time reporting capabilities (e.g. JIRA, Slack) to provide quick feedback to engineers and can perform auto-remediation of some misconfigurations. This helps to protect products deployed on cloud by creating secure guardrails. Documentation Dow Jones Hammer documentation is available via GitHub Pages at https://dowjones.github.io/hammer/ . Security features Insecure Services S3 ACL Public Access S3 Policy Public Access IAM User Inactive Keys IAM User Keys Rotation CloudTrail Logging Issues EBS Unencrypted Volumes EBS Public Snapshots RDS Public Snapshots SQS Public Policy Access S3 Unencrypted Buckets RDS Unencrypted Instances AMIs Public Access Technologies Python 3.6 AWS (Lambda, Dynamodb, EC2, SNS, CloudWatch, CloudFormation) Terraform JIRA Slack Contributing You are welcome to contribute! Issues: You can use GitHub Issues to report issues. Describe what is going on wrong and what you expect to be correct behaviour. Patches: We currently use dev branch for ongoing development. Please open PRs to this branch. Run tests: Run tests with this command: tox Contact Us Feel free to create issue report , pull request or just email us at [email protected] with any other questions or concerns you have. Download Dow Jones Hammer
http://govanguard.com/wp-content/uploads/2018/04/Header_Logo.png 0 0 govanguard http://govanguard.com/wp-content/uploads/2018/04/Header_Logo.png govanguard2019-08-17 17:47:002019-08-17 17:47:00Dow Jones Hammer - Protect The Cloud With The Power Of The cloud(AWS)
Our Standard Office Hours
Monday – Friday: 8:00AM – 5:00PM EDT
Saturday – Sunday: Closed
Where to Find Us
Data Privacy Notice
- – All product names, logos, and brands are property of their respective owners.
- – The use of these names, logos, and brands is for identification purposes only and does not imply endorsement.
- – Content syndication and aggregation of public information is solely for the purpose of identifying information security trends, all syndicated content contains source links to the content creator website. All content is owned by it’s respective content creators.
- – If you are an owner of some content and want it to be removed, please email firstname.lastname@example.org