ThreatConnect Marketplace
  • Apps
  • Playbooks
  • Apps
  • Playbooks
Home » Apps Overview » Amazon Elastic Compute Cloud (EC2)
Back to Apps

Categories:
  • IT Infrastructure
Built by

ThreatConnect

Amazon Elastic Compute Cloud (EC2)

Amazon Elastic Compute Cloud (EC2) allows users to rent virtual computers to run their own computer applications. For ThreatConnect customers that leverage EC2 for the bulk of their cloud infrastructure, there’s potential exposure for malicious activity. Eventually, there will be a successful breach, and remediation must take place. The EC2 Playbook app allows you to perform various Incident Response actions on your EC2 infrastructure from ThreatConnect. The following actions are available:

  • Describe Instances
  • Create Tags
  • Delete Tags
  • Monitor Instances
  • Unmonitor Instances
  • Describe Snapshots
  • Create Snapshot
  • Assign Security Group
  • Remove Security Group
  • Add ACL
  • Remove ACL

This app can be found in the ThreatConnect App Catalog under the name: Amazon Elastic Compute Cloud (EC2)

Related Apps

Google Drive
IT Infrastructure

With the Google Drive Playbook app, you can easily drive investigations and automate actions within the Google suite.

Amazon Simple Storage Service (S3)
IT Infrastructure

With this Playbook app, you can take automated actions with Amazon S3 buckets and objects so that you can more easily manage...

TCP/UDP Listener
IT Infrastructure

A TCP/UDP listener service on a given address, that can filter non-binary message using a given regex pattern.

Developers

  • Knowledge Base
  • Training Site

Company

  • ThreatConnect
  • Contact Us
  • Blog
  • Twitter
  • Facebook
  • Linkedin

© Copyright - ThreatConnect Marketplace
Scroll to top