Partnership

AWS × Tines

Automate cloud security with AWS and Tines

Automate cloud security
with AWS and Tines

An illustration of a tunnel connecting the sky to the ground

Cloud security is a fast-changing and dynamic environment which results in many teams struggling to know what is serious and what is noise.

Tines, built exclusively on AWS, helps teams quickly remediate known threats while effectively triaging the new. Providing a user friendly interface to build automation Stories, teams are able to quickly create new workflows, utilizing native AWS APIs to create solutions based on their team’s needs. Tines also is packaged with thousands of Action templates to utilize threat detection services outside of the AWS ecosystem.

Tines allows AWS customers to...

Automate

security alerts management

Streamline

incident response

Improve

accuracy and remediation timelines

Use case examples

Example 1

Sysdig Cloud Detection, Document with Jira, and Respond with Tines

This story recieves Sysdig Kubernetes threat alerts through the webhook integrations. The story then retrieves asset information sysdig . Tines calls on Jira to documents each alert for tracking purposes. The story will take steps in to executing response automated workflows based on the alert type.

Community author

Manuel Boira at Sysdig

Example 2

Detect and Enrich Sysdig Alerts with Risky User with Greynoise and Deny User from AWS Console Login

This narrative begins by receiving Sysdig Cloudtrail alerts via notification integrations. Upon receiving an alert, the system retrieves user identity information from Sysdig, utilizing it to generate a risk score. Furthermore, the story conducts an IP lookup associated with the user to ascertain its reputation. In the event of a malicious IP address, the system autonomously implements a deny-all policy, effectively blocking the user from accessing the AWS console login.

Community author

Manuel Boira at Sysdig

Example 3

Chat with AWS Bedrock in Slack threads

Initiate conversations with AWS Bedrock from within Slack and receive responses in a dedicated thread, allowing for an uninterrupted, in-depth discussion.

Tools

AWS, Slack

Created by

Michael Tolan

Example 4

Create AWS RDS databases from a backup via Slack

Start an AWS RDS recovery via Slack. Retrieve database identifiers, and on approval, create a database from the latest backup.

Tools

AWS, Slack

Created by

Conor Dunne

Example 5

Routinely sync Jira issue details with DynamoDB

Retrieve and format updated Jira issues, then store them in DynamoDB for analysis. Continuously cycle through updates to ensure data in AWS is current.

Tools

AWS, Jira

Created by

Michael Tolan

Example 6

Create an identity federation between GCP and AWS

This story automates the identity federation between a GCP service account and an AWS IAM role. This results in an active set of AWS STS credentials that can be used to automate AWS actions using the AWS IAM role.

Tools

AWS, Google

Community author

Marcus Hallberg at Spotify

Whether it’s EDR, traffic behavior analysis, firewall management, IDS, phishing simulations, or anything else we use, Tines is very easy to plug into everything, get the alerts we want, and have it process them. That takes hours off our work.

Joel Perez-Sanchez
Security Engineer
Logo of Joel Perez-Sanchez

Tines is very intuitive in pretty much every aspect; the platform is just really easy to use, so it does a really good job at saving time. The time saved pays for itself, in my opinion.

Dylan White
Information Security Engineer
Logo of Dylan White

Automate cloud security
with AWS and Tines