Skip to content

Commit

Permalink
Updating AWS CAF link change
Browse files Browse the repository at this point in the history
  • Loading branch information
kihakuni authored Jul 17, 2024
1 parent fb50fd4 commit 180768c
Show file tree
Hide file tree
Showing 14 changed files with 14 additions and 14 deletions.
2 changes: 1 addition & 1 deletion docs/Amazon_Q.md
Original file line number Diff line number Diff line change
Expand Up @@ -32,7 +32,7 @@ Throughout the execution of the playbook, focus on the _***desired outcomes***_,
* **Return to original and hardened configuration**

#### Enhance CAF Security Perspective components:
[AWS Cloud Adoption Framework Security Perspective](https://d0.awsstatic.com/whitepapers/AWS_CAF_Security_Perspective.pdf)
[AWS Cloud Adoption Framework Security Perspective](https://docs.aws.amazon.com/whitepapers/latest/aws-caf-security-perspective/aws-caf-security-perspective.html)
* **Directive**
* **Detective**
* **Responsive**
Expand Down
2 changes: 1 addition & 1 deletion docs/Analyzing_VPC_Flow_Logs.md
Original file line number Diff line number Diff line change
Expand Up @@ -35,7 +35,7 @@ Throughout the execution of the playbook, focus on the _***desired outcomes***_,
* **Return to original and hardened configuration**

#### Enhance CAF Security Perspective components:
[AWS Cloud Adoption Framework Security Perspective](https://d0.awsstatic.com/whitepapers/AWS_CAF_Security_Perspective.pdf)
[AWS Cloud Adoption Framework Security Perspective](https://docs.aws.amazon.com/whitepapers/latest/aws-caf-security-perspective/aws-caf-security-perspective.html)
* **Directive**
* **Detective**
* **Responsive**
Expand Down
2 changes: 1 addition & 1 deletion docs/Code_Exposure.md
Original file line number Diff line number Diff line change
Expand Up @@ -55,7 +55,7 @@ Throughout the execution of the playbook, focus on the _***desired outcomes***_,
* **Minimize or eliminate risks of exposed code**

#### Enhance CAF Security Perspective components:
[AWS Cloud Adoption Framework Security Perspective](https://d0.awsstatic.com/whitepapers/AWS_CAF_Security_Perspective.pdf)
[AWS Cloud Adoption Framework Security Perspective](https://docs.aws.amazon.com/whitepapers/latest/aws-caf-security-perspective/aws-caf-security-perspective.html)
* **Directive**
* **Detective**
* **Responsive**
Expand Down
2 changes: 1 addition & 1 deletion docs/Denial_of_Service.md
Original file line number Diff line number Diff line change
Expand Up @@ -44,7 +44,7 @@ Throughout the execution of the playbook, focus on the _***desired outcomes***_,
* **Return to original and hardened configuration**

#### Enhance CAF Security Perspective components:
[AWS Cloud Adoption Framework Security Perspective](https://d0.awsstatic.com/whitepapers/AWS_CAF_Security_Perspective.pdf)
[AWS Cloud Adoption Framework Security Perspective](https://docs.aws.amazon.com/whitepapers/latest/aws-caf-security-perspective/aws-caf-security-perspective.html)
* **Directive**
* **Detective**
* **Responsive**
Expand Down
2 changes: 1 addition & 1 deletion docs/EC2_Forensics.md
Original file line number Diff line number Diff line change
Expand Up @@ -34,7 +34,7 @@ Throughout the execution of the playbook, focus on the _***desired outcomes***_,
* **Return to original and hardened configuration**

#### Enhance CAF Security Perspective components:
[AWS Cloud Adoption Framework Security Perspective](https://d0.awsstatic.com/whitepapers/AWS_CAF_Security_Perspective.pdf)
[AWS Cloud Adoption Framework Security Perspective](https://docs.aws.amazon.com/whitepapers/latest/aws-caf-security-perspective/aws-caf-security-perspective.html)
* **Directive**
* **Detective**
* **Responsive**
Expand Down
2 changes: 1 addition & 1 deletion docs/Playbook_Development_Guide.md
Original file line number Diff line number Diff line change
Expand Up @@ -17,7 +17,7 @@ This AWS Content is provided subject to the terms of the AWS Customer Agreement
## Playbook structure:

1. **Threat**: Describes the threat that is been addressed by the playbook
2. **Endgame**: Describes the desired outcomes for the playbook based on the security perspective of the _[*AWS Cloud Adoption Framework (CAF)*](https://d0.awsstatic.com/whitepapers/AWS_CAF_Security_Perspective.pdf)_ and industry accepted security patterns, such as, vulnerability assessment and impact analysis.
2. **Endgame**: Describes the desired outcomes for the playbook based on the security perspective of the _[*AWS Cloud Adoption Framework (CAF)*](https://docs.aws.amazon.com/whitepapers/latest/aws-caf-security-perspective/aws-caf-security-perspective.html)_ and industry accepted security patterns, such as, vulnerability assessment and impact analysis.
3. **Response steps**: Provides step-by-step procedure in chronological order to respond to the event based on *[_NIST 800-61r2 - Computer Security Incident Response Guide_](https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-61r2.pdf)*. Refer to figure A.
4. **Simulation** [**CODE**]: Provides step-by-step procedure to generate the indicators required to trigger the alert initiating the response.
5. **Incident classification, handling, and detection**: Categorizes the playbook per [*_MITRE ATT&CK_* enterprise tactics](https://attack.mitre.org/tactics/enterprise/), enumerates the tools required for running the playbook, enumerates the indicators (a.k.a. findings) used for detection generating the alert, log sources required to generate indicators and facilitate analysis, and the teams involved.
Expand Down
2 changes: 1 addition & 1 deletion docs/RDS_Public_Access.md
Original file line number Diff line number Diff line change
Expand Up @@ -34,7 +34,7 @@ Throughout the execution of the playbook, focus on the _***desired outcomes***_,
* **Return to original and hardened configuration**

#### Enhance CAF Security Perspective components:
[AWS Cloud Adoption Framework Security Perspective](https://d0.awsstatic.com/whitepapers/AWS_CAF_Security_Perspective.pdf)
[AWS Cloud Adoption Framework Security Perspective](https://docs.aws.amazon.com/whitepapers/latest/aws-caf-security-perspective/aws-caf-security-perspective.html)
* **Directive**
* **Detective**
* **Responsive**
Expand Down
2 changes: 1 addition & 1 deletion docs/Ransom_Response_EC2_Linux.md
Original file line number Diff line number Diff line change
Expand Up @@ -30,7 +30,7 @@ Throughout the execution of the playbook, focus on the _***desired outcomes***_,
* **Return to original and hardened configuration**

#### Enhance CAF Security Perspective components:
[AWS Cloud Adoption Framework Security Perspective](https://d0.awsstatic.com/whitepapers/AWS_CAF_Security_Perspective.pdf)
[AWS Cloud Adoption Framework Security Perspective](https://docs.aws.amazon.com/whitepapers/latest/aws-caf-security-perspective/aws-caf-security-perspective.html)
* **Directive**
* **Detective**
* **Responsive**
Expand Down
2 changes: 1 addition & 1 deletion docs/Ransom_Response_EC2_Windows.md
Original file line number Diff line number Diff line change
Expand Up @@ -30,7 +30,7 @@ Throughout the execution of the playbook, focus on the _***desired outcomes***_,
* **Return to original and hardened configuration**

#### Enhance CAF Security Perspective components:
[AWS Cloud Adoption Framework Security Perspective](https://d0.awsstatic.com/whitepapers/AWS_CAF_Security_Perspective.pdf)
[AWS Cloud Adoption Framework Security Perspective](https://docs.aws.amazon.com/whitepapers/latest/aws-caf-security-perspective/aws-caf-security-perspective.html)
* **Directive**
* **Detective**
* **Responsive**
Expand Down
2 changes: 1 addition & 1 deletion docs/Ransom_Response_RDS.md
Original file line number Diff line number Diff line change
Expand Up @@ -30,7 +30,7 @@ Throughout the execution of the playbook, focus on the _***desired outcomes***_,
* **Return to original and hardened configuration**

#### Enhance CAF Security Perspective components:
[AWS Cloud Adoption Framework Security Perspective](https://d0.awsstatic.com/whitepapers/AWS_CAF_Security_Perspective.pdf)
[AWS Cloud Adoption Framework Security Perspective](https://docs.aws.amazon.com/whitepapers/latest/aws-caf-security-perspective/aws-caf-security-perspective.html)
* **Directive**
* **Detective**
* **Responsive**
Expand Down
2 changes: 1 addition & 1 deletion docs/Ransom_Response_S3.md
Original file line number Diff line number Diff line change
Expand Up @@ -25,7 +25,7 @@ Throughout the execution of the playbook, focus on the _***desired outcomes***_,
* **Return to original and hardened configuration**

#### Enhance CAF Security Perspective components:
[AWS Cloud Adoption Framework Security Perspective](https://d0.awsstatic.com/whitepapers/AWS_CAF_Security_Perspective.pdf)
[AWS Cloud Adoption Framework Security Perspective](https://docs.aws.amazon.com/whitepapers/latest/aws-caf-security-perspective/aws-caf-security-perspective.html)
* **Directive**
* **Detective**
* **Responsive**
Expand Down
2 changes: 1 addition & 1 deletion docs/Responding_to_SES_Events.md
Original file line number Diff line number Diff line change
Expand Up @@ -20,7 +20,7 @@ Throughout the execution of the playbook, focus on the _***desired outcomes***_,
* **Return to original and hardened configuration**

#### Enhance CAF Security Perspective components:
[AWS Cloud Adoption Framework Security Perspective](https://d0.awsstatic.com/whitepapers/AWS_CAF_Security_Perspective.pdf)
[AWS Cloud Adoption Framework Security Perspective](https://docs.aws.amazon.com/whitepapers/latest/aws-caf-security-perspective/aws-caf-security-perspective.html)
* **Directive**
* **Detective**
* **Responsive**
Expand Down
2 changes: 1 addition & 1 deletion docs/S3_Public_Access.md
Original file line number Diff line number Diff line change
Expand Up @@ -52,7 +52,7 @@ Throughout the execution of the playbook, focus on the _***desired outcomes***_,
* **Return to original and hardened configuration**

#### Enhance CAF Security Perspective components:
[AWS Cloud Adoption Framework Security Perspective](https://d0.awsstatic.com/whitepapers/AWS_CAF_Security_Perspective.pdf)
[AWS Cloud Adoption Framework Security Perspective](https://docs.aws.amazon.com/whitepapers/latest/aws-caf-security-perspective/aws-caf-security-perspective.html)
* **Directive**
* **Detective**
* **Responsive**
Expand Down
2 changes: 1 addition & 1 deletion docs/Unauthorized_Network_Changes.md
Original file line number Diff line number Diff line change
Expand Up @@ -86,7 +86,7 @@ Throughout the execution of the playbook, focus on the _***desired outcomes***_,
* **Return to original and hardened configuration**

#### Enhance CAF Security Perspective components:
[AWS Cloud Adoption Framework Security Perspective](https://d0.awsstatic.com/whitepapers/AWS_CAF_Security_Perspective.pdf)
[AWS Cloud Adoption Framework Security Perspective](https://docs.aws.amazon.com/whitepapers/latest/aws-caf-security-perspective/aws-caf-security-perspective.html)
* **Directive**
* **Detective**
* **Responsive**
Expand Down

0 comments on commit 180768c

Please sign in to comment.