You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Security teams struggle to normalise, store, and query these events quickly for incident response, compliance, and threat detection.
5
5
6
-
Existing SIEMs can be costly or slow to adapt; many orgs need a focused, API-first way to ingest and surface security-relevant events.
6
+
Existing SIEMs can be costly or slow to adapt; many orgs need a focused, API-first way to collect and surface security‑relevant events.
7
7
8
8
### Task
9
-
- Build a lightweight, API-driven service to ingest AWS CloudTrail events, persist security-relevant records, and expose them via standardised endpoints.
9
+
- Build a lightweight, API-driven service to pull AWS CloudTrail events, persist security-relevant records, and expose them via standardised endpoints.
10
10
- Provide a foundation that can expand to other security sources (IAM, AWS Config) and integrate with dashboards/alerting.
11
11
- Keep it developer-friendly (NestJS/TypeScript), operationally simple (PostgreSQL + TypeORM), and secure-by-default.
12
12
@@ -24,7 +24,7 @@ Existing SIEMs can be costly or slow to adapt; many orgs need a focused, API-fir
24
24
-`GET /aws-security/db-events`
25
25
-`POST /cloudtrail/test`
26
26
- There's WT auth for non-health endpoints and global validation.
0 commit comments