Skip to content

Instantly share code, notes, and snippets.

@toufik-airane
Last active April 15, 2025 20:07
Show Gist options
  • Select an option

  • Save toufik-airane/84fbe72375de59242af651220ee692bd to your computer and use it in GitHub Desktop.

Select an option

Save toufik-airane/84fbe72375de59242af651220ee692bd to your computer and use it in GitHub Desktop.
## 🧠 Identity & Access Management
- **Admin Access Review**: Revoke AWS users with admin rights not in DevOps
- **GitHub Team Audit**: Flag GitHub teams with production access not covered by policy
- **Customer Data Role Review**: Collect roles with access to sensitive data and request reapproval
- **MFA Enforcement**: Verify MFA is enabled for all GitHub and Okta admin accounts
- **Least Privilege Validation**: Validate least privilege in production systems
- **Geo Check**: Compare login geolocation with allowed countries
- **Dependabot Audit**: Identify GitHub repos without Dependabot and calculate compliance percentage
## πŸ›‘οΈ Vulnerability Management
- **Prod Scan**: Run Nuclei scan on https://prod.app.com for high and critical vulnerabilities
- **Infra Recon**: Perform subdomain enumeration and port scan on staging.project.io
- **DAST Auth**: Run authenticated DAST scan on the customer portal login flow
- **SSH Exposure**: Scan AWS EC2 for open SSH ports
- **S3 Audit**: Check for public S3 buckets with sensitive data
- **Firewall Scan**: Scan GCP firewall rules for misconfigurations
## 🚨 Incident Response
- **Critical CrowdStrike**: Isolate host on critical CrowdStrike alert
- **SIEM Enrichment**: Enrich SIEM alerts with asset and user context
- **SentinelOne Triage**: Auto-triage SentinelOne alerts and escalate confirmed incidents
- **Ransomware Lockdown**: Lock infected user accounts in Okta on ransomware detection
- **Breach Timeline**: Collect logs from affected services and build a breach timeline
- **Foreign Login Monitor**: Analyze login attempts from foreign countries for anomalies
## πŸ“‹ Compliance & Audit
- **SOC2 AC-2 Check**: Verify SOC2 control status in Vanta
- **Access Log Evidence**: Collect Okta access logs for audit
- **Patch SLA Check**: Confirm systems are patched within 7 days of CVE release
- **License Check**: Scan GitHub repos for open source license violations
- **Vendor Compliance Check**: Check vendor attestations
- **EOL Enforcement**: Detect and remove end-of-life software in production
## πŸ–₯️ Asset Management
- **Unused IAM Roles**: Identify AWS IAM roles unused for 60+ days
- **S3 Security Config**: Ensure all S3 buckets have encryption and logging enabled
- **Cloud Cleanup**: Detect unused cloud assets
- **Secrets Detection**: Scan latest GitHub commits for secrets or misconfigured IaC
- **Docker Security**: Scan Dockerfiles for vulnerabilities and misconfigurations
- **Dependency Guard**: Block pull requests with unscanned third-party dependencies
## πŸ“‘ Monitoring & Alerting
- **Weekly Event Digest**: Compile security event summary
- **Failed Logins Report**: Generate a report of failed access attempts
- **Vuln Summary**: Summarize high-severity vulnerabilities across recent scans
- **Cert Expiry Check**: Identify expiring TLS certificates
- **Jira Vuln Dashboard**: Generate dashboard with open vulnerabilities grouped by team
- **Software Deviation**: Detect deviations from approved software list on corporate devices
## πŸŽ“ Training & Awareness
- **Phishing Sim**: Send simulated phishing training to all employees
- **Training Tracker**: Track completion of mandatory security training
- **Secret Paste Alert**: Detect internal secrets in public forums
- **Password Age Alert**: Identify users with passwords older than 90 days
- **Password Reuse Detection**: Detect reuse of passwords across applications
- **New Hire Security Onboarding**: Trigger security training for new hires
## 🀝 Vendor Management
- **Vendor Risk Feed**: Monitor third-party vendors for recent security incidents
- **Vendor Access Scope**: Validate that vendor accounts follow least privilege
- **Data Vendor Review**: Review vendors storing customer data
- **Attestation Check**: Verify vendor security attestations
- **Vendor Endpoint Drift**: Detect changes in vendor endpoints
- **Vendor Logs Review**: Analyze vendor access logs
## πŸ” Data Protection
- **PII Scanner**: Scan Google Drive for sensitive personal data
- **Outbound Email Scan**: Monitor outbound email for unencrypted attachments
- **RDS Encryption**: Identify RDS databases missing encryption at rest
- **File Share Monitor**: Detect publicly shared files from internal systems
- **Data Upload Watch**: Detect customer data uploaded to non-approved platforms
- **Sensitive Access Audit**: Track access to protected data repositories
## πŸ’» Endpoint Security
- **USB Detection**: Detect USB devices used on critical endpoints
- **Antivirus Status**: Verify antivirus is active and up to date
- **Software Audit**: Detect installation of unauthorized software
- **MDM Policy Bypass**: Detect mobile devices bypassing MDM policies
- **Patch Compliance**: Verify current security patches on all endpoints
- **EDR Alerts**: Monitor for suspicious endpoint behavior using EDR tools
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment