{"id":27498,"date":"2022-10-20T09:32:21","date_gmt":"2022-10-20T09:32:21","guid":{"rendered":"https:\/\/kalilinuxtutorials.com\/?p=27498"},"modified":"2022-10-20T09:32:23","modified_gmt":"2022-10-20T09:32:23","slug":"matano","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/matano\/","title":{"rendered":"Matano : The Open-Source Security Lake Platform For AWS"},"content":{"rendered":"\n<p><strong>Matano <\/strong>is an open source security lake platform for AWS. It lets you ingest petabytes of security and log data from various sources, store and query them in an open Apache Iceberg data lake, and create Python detections as code for realtime alerting. Matano is fully serverless and designed specifically for AWS and focuses on enabling high scale, low cost, and zero-ops. Matano deploys fully into your AWS account.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgU05Y1sofHm4ZapIXnFhRj-j0gdBgk8ANPrpfwpzHgfvUMzx6mLe92PRiAm2CXGqX3ZDrBepHrNPyWXiHkEnW5Ywn81OHVnx3OIrqxuJ2tF8FCMExPFCVoBLWAZBuCU8tyBjWkCzOuB2fRizEE_JNDxfEPPdSfwL-4j3CCI8bHFYGoRk_RRlpwngeX\/s1343\/Matano.png\" alt=\"\" \/><\/figure>\n\n\n\n<h2 class=\"has-text-align-center has-light-green-cyan-background-color has-background wp-block-heading\">Features<\/h2>\n\n\n\n<h4 class=\"has-cyan-bluish-gray-background-color has-background wp-block-heading\"><a href=\"https:\/\/github.com\/matanolabs\/matano#collect-data-from-all-your-sources\"><\/a>Collect data from all your sources<\/h4>\n\n\n\n<p>Matano lets you collect log data from sources using <a href=\"https:\/\/github.com\/matanolabs\/matano#\">S3<\/a> or SQS based ingestion.<\/p>\n\n\n\n<h4 class=\"has-cyan-bluish-gray-background-color has-background wp-block-heading\"><a href=\"https:\/\/github.com\/matanolabs\/matano#ingest-transform-normalize-log-data\"><\/a>Ingest, transform, normalize log data<\/h4>\n\n\n\n<p>Matano normalizes and transforms your data using <a href=\"https:\/\/vector.dev\/docs\/reference\/vrl\/\">Vector Remap Language (VRL)<\/a>. Matano works with the <a href=\"https:\/\/www.elastic.co\/guide\/en\/ecs\/current\/index.html\">Elastic Common Schema (ECS)<\/a> by default and you can define your own schema.<\/p>\n\n\n\n<h4 class=\"has-cyan-bluish-gray-background-color has-background wp-block-heading\"><a href=\"https:\/\/github.com\/matanolabs\/matano#store-data-in-s3-object-storage\"><\/a>Store data in S3 object storage<\/h4>\n\n\n\n<p>Log data is always stored in S3 object storage, for cost effective, long term, durable storage.<\/p>\n\n\n\n<h4 class=\"has-cyan-bluish-gray-background-color has-background wp-block-heading\"><a href=\"https:\/\/github.com\/matanolabs\/matano#apache-iceberg-data-lake\"><\/a>Apache Iceberg Data lake<\/h4>\n\n\n\n<p>All data is ingested into an Apache Iceberg based data lake, allowing you to perform ACID transactions, time travel, and more on all your log data. Apache Iceberg is an open table format, so you always <strong>own your own data<\/strong>, with no vendor lock-in.<\/p>\n\n\n\n<h4 class=\"has-cyan-bluish-gray-background-color has-background wp-block-heading\"><a href=\"https:\/\/github.com\/matanolabs\/matano#serverless\"><\/a>Serverless<\/h4>\n\n\n\n<p>Matano is a fully serverless platform, designed for zero-ops and unlimited elastic horizontal scaling.<\/p>\n\n\n\n<h4 class=\"has-cyan-bluish-gray-background-color has-background wp-block-heading\">Detections as code<\/h4>\n\n\n\n<p>Write Python detections to implement realtime alerting on your log data.<\/p>\n\n\n\n<h2 class=\"has-text-align-center has-light-green-cyan-background-color has-background wp-block-heading\"><a href=\"https:\/\/github.com\/matanolabs\/matano#installing\"><\/a>Installing<\/h2>\n\n\n\n<p><a href=\"https:\/\/www.matano.dev\/docs\/installation\"><strong>View the complete installation instructions.<\/strong><\/a><\/p>\n\n\n\n<p>You can install the matano CLI to deploy Matano into your AWS account, and manage your Matano deployment.<\/p>\n\n\n\n<h3 class=\"has-cyan-bluish-gray-background-color has-background wp-block-heading\"><a href=\"https:\/\/github.com\/matanolabs\/matano#requirements\"><\/a>Requirements<\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li>Docker<\/li><\/ul>\n\n\n\n<h3 class=\"has-cyan-bluish-gray-background-color has-background wp-block-heading\"><a href=\"https:\/\/github.com\/matanolabs\/matano#installation\"><\/a>Installation<\/h3>\n\n\n\n<p>Matano provides <a href=\"https:\/\/github.com\/matanolabs\/matano\/releases\/tag\/nightly\">a nightly release<\/a> with the latest prebuilt files to install the Matano CLI on GitHub. You can download and execute these files to install Matano.<\/p>\n\n\n\n<p>For example, to install the Matano CLI for Linux, run:<\/p>\n\n\n\n<pre class=\"wp-block-preformatted has-vivid-green-cyan-color has-black-background-color has-text-color has-background\">curl -OL https:\/\/github.com\/matanolabs\/matano\/releases\/download\/nightly\/matano-linux-x64.sh\nchmod +x matano-linux-x64.sh\nsudo .\/matano-linux-x64.sh<\/pre>\n\n\n\n<h2 class=\"has-cyan-bluish-gray-background-color has-background wp-block-heading\"><a href=\"https:\/\/github.com\/matanolabs\/matano#getting-started\"><\/a>Getting started<\/h2>\n\n\n\n<p><a href=\"https:\/\/www.matano.dev\/docs\/getting-started\"><strong>Read the complete docs on getting started<\/strong><\/a>.<\/p>\n\n\n\n<h3 class=\"has-cyan-bluish-gray-background-color has-background wp-block-heading\"><a href=\"https:\/\/github.com\/matanolabs\/matano#deployment\"><\/a>Deployment<\/h3>\n\n\n\n<p>To get started with Matano, run the <code>matano init<\/code> command. Make sure you have AWS credentials in your environment (or in an AWS CLI profile).<\/p>\n\n\n\n<p>The interactive CLI wizard will walk you through getting started by generating an initial <a href=\"https:\/\/www.matano.dev\/docs\/matano-directory\">Matano directory<\/a> for you, initializing your AWS account, and deploying Matano into your AWS account.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgmnPfIoDf8zG5akIJCPrLq1fazXG-89V_K2uVL2GZ0-DTx9eUCb0SMGLne432tXp0gexAFzzuouhXWK8GBKafJwHIdV7V30fxawzPjGIo4qYncZr6lv1nO8FeaPlv0N69X_Meb1K4W02wzgwlRuTXbfi0B1CvP0ispb1XRo_I_An3uAqRGUZNDD26c\/s1770\/Matano1.gif\" alt=\"\" \/><\/figure>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button aligncenter\"><a class=\"wp-block-button__link\" href=\"https:\/\/github.com\/matanolabs\/matano\">Click Here To Download<\/a><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Matano is an open source security lake platform for AWS. It lets you ingest petabytes of security and log data from various sources, store and query them in an open Apache Iceberg data lake, and create Python detections as code for realtime alerting. Matano is fully serverless and designed specifically for AWS and focuses on [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":27500,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi7LcFlmSyKRgBm6WtuQ_x651wxZVATu3_cgES9uAhm_hRjbxylEXmCrxoFrBUqM6HYEnUbsPLAl00C-B_o4DLuLu9WA9bF2SGXN5Apc8Ig1qixdYt03yg9-gjl7WiLnjVIS_TkahZkbR_9VdPmkmFaTd0X-baIJf37trTjCU_UjZch7wRyoOI47OqD\/s728\/image.psd(1).png","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[28],"tags":[305,5709,2327,2998],"class_list":["post-27498","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-kali","tag-aws","tag-matano","tag-open-source-2","tag-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Matano : The Open-Source Security Lake Platform For AWS<\/title>\n<meta name=\"description\" content=\"Matano is an open source security lake platform for AWS. It lets you ingest petabytes of security and log data from various sources, store\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/matano\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Matano : The Open-Source Security Lake Platform For AWS\" \/>\n<meta property=\"og:description\" content=\"Matano is an open source security lake platform for AWS. It lets you ingest petabytes of security and log data from various sources, store\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/matano\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2022-10-20T09:32:21+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-10-20T09:32:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi7LcFlmSyKRgBm6WtuQ_x651wxZVATu3_cgES9uAhm_hRjbxylEXmCrxoFrBUqM6HYEnUbsPLAl00C-B_o4DLuLu9WA9bF2SGXN5Apc8Ig1qixdYt03yg9-gjl7WiLnjVIS_TkahZkbR_9VdPmkmFaTd0X-baIJf37trTjCU_UjZch7wRyoOI47OqD\/s728\/image.psd(1).png\" \/>\n<meta name=\"author\" content=\"R K\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi7LcFlmSyKRgBm6WtuQ_x651wxZVATu3_cgES9uAhm_hRjbxylEXmCrxoFrBUqM6HYEnUbsPLAl00C-B_o4DLuLu9WA9bF2SGXN5Apc8Ig1qixdYt03yg9-gjl7WiLnjVIS_TkahZkbR_9VdPmkmFaTd0X-baIJf37trTjCU_UjZch7wRyoOI47OqD\/s728\/image.psd(1).png\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"R K\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/matano\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/matano\/\"},\"author\":{\"name\":\"R K\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\"},\"headline\":\"Matano : The Open-Source Security Lake Platform For AWS\",\"datePublished\":\"2022-10-20T09:32:21+00:00\",\"dateModified\":\"2022-10-20T09:32:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/matano\/\"},\"wordCount\":360,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/matano\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi7LcFlmSyKRgBm6WtuQ_x651wxZVATu3_cgES9uAhm_hRjbxylEXmCrxoFrBUqM6HYEnUbsPLAl00C-B_o4DLuLu9WA9bF2SGXN5Apc8Ig1qixdYt03yg9-gjl7WiLnjVIS_TkahZkbR_9VdPmkmFaTd0X-baIJf37trTjCU_UjZch7wRyoOI47OqD\/s728\/image.psd(1).png\",\"keywords\":[\"AWS\",\"Matano\",\"Open Source\",\"security\"],\"articleSection\":[\"Kali Linux\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/matano\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/matano\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/matano\/\",\"name\":\"Matano : The Open-Source Security Lake Platform For AWS\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/matano\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/matano\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi7LcFlmSyKRgBm6WtuQ_x651wxZVATu3_cgES9uAhm_hRjbxylEXmCrxoFrBUqM6HYEnUbsPLAl00C-B_o4DLuLu9WA9bF2SGXN5Apc8Ig1qixdYt03yg9-gjl7WiLnjVIS_TkahZkbR_9VdPmkmFaTd0X-baIJf37trTjCU_UjZch7wRyoOI47OqD\/s728\/image.psd(1).png\",\"datePublished\":\"2022-10-20T09:32:21+00:00\",\"dateModified\":\"2022-10-20T09:32:23+00:00\",\"description\":\"Matano is an open source security lake platform for AWS. It lets you ingest petabytes of security and log data from various sources, store\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/matano\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/matano\/#primaryimage\",\"url\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi7LcFlmSyKRgBm6WtuQ_x651wxZVATu3_cgES9uAhm_hRjbxylEXmCrxoFrBUqM6HYEnUbsPLAl00C-B_o4DLuLu9WA9bF2SGXN5Apc8Ig1qixdYt03yg9-gjl7WiLnjVIS_TkahZkbR_9VdPmkmFaTd0X-baIJf37trTjCU_UjZch7wRyoOI47OqD\/s728\/image.psd(1).png\",\"contentUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi7LcFlmSyKRgBm6WtuQ_x651wxZVATu3_cgES9uAhm_hRjbxylEXmCrxoFrBUqM6HYEnUbsPLAl00C-B_o4DLuLu9WA9bF2SGXN5Apc8Ig1qixdYt03yg9-gjl7WiLnjVIS_TkahZkbR_9VdPmkmFaTd0X-baIJf37trTjCU_UjZch7wRyoOI47OqD\/s728\/image.psd(1).png\",\"width\":\"728\",\"height\":\"380\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\",\"name\":\"R K\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"caption\":\"R K\"},\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Matano : The Open-Source Security Lake Platform For AWS","description":"Matano is an open source security lake platform for AWS. It lets you ingest petabytes of security and log data from various sources, store","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/matano\/","og_locale":"en_US","og_type":"article","og_title":"Matano : The Open-Source Security Lake Platform For AWS","og_description":"Matano is an open source security lake platform for AWS. It lets you ingest petabytes of security and log data from various sources, store","og_url":"https:\/\/kalilinuxtutorials.com\/matano\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2022-10-20T09:32:21+00:00","article_modified_time":"2022-10-20T09:32:23+00:00","og_image":[{"url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi7LcFlmSyKRgBm6WtuQ_x651wxZVATu3_cgES9uAhm_hRjbxylEXmCrxoFrBUqM6HYEnUbsPLAl00C-B_o4DLuLu9WA9bF2SGXN5Apc8Ig1qixdYt03yg9-gjl7WiLnjVIS_TkahZkbR_9VdPmkmFaTd0X-baIJf37trTjCU_UjZch7wRyoOI47OqD\/s728\/image.psd(1).png","type":"","width":"","height":""}],"author":"R K","twitter_card":"summary_large_image","twitter_image":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi7LcFlmSyKRgBm6WtuQ_x651wxZVATu3_cgES9uAhm_hRjbxylEXmCrxoFrBUqM6HYEnUbsPLAl00C-B_o4DLuLu9WA9bF2SGXN5Apc8Ig1qixdYt03yg9-gjl7WiLnjVIS_TkahZkbR_9VdPmkmFaTd0X-baIJf37trTjCU_UjZch7wRyoOI47OqD\/s728\/image.psd(1).png","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"R K","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/matano\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/matano\/"},"author":{"name":"R K","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad"},"headline":"Matano : The Open-Source Security Lake Platform For AWS","datePublished":"2022-10-20T09:32:21+00:00","dateModified":"2022-10-20T09:32:23+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/matano\/"},"wordCount":360,"commentCount":0,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/matano\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi7LcFlmSyKRgBm6WtuQ_x651wxZVATu3_cgES9uAhm_hRjbxylEXmCrxoFrBUqM6HYEnUbsPLAl00C-B_o4DLuLu9WA9bF2SGXN5Apc8Ig1qixdYt03yg9-gjl7WiLnjVIS_TkahZkbR_9VdPmkmFaTd0X-baIJf37trTjCU_UjZch7wRyoOI47OqD\/s728\/image.psd(1).png","keywords":["AWS","Matano","Open Source","security"],"articleSection":["Kali Linux"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kalilinuxtutorials.com\/matano\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/matano\/","url":"https:\/\/kalilinuxtutorials.com\/matano\/","name":"Matano : The Open-Source Security Lake Platform For AWS","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/matano\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/matano\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi7LcFlmSyKRgBm6WtuQ_x651wxZVATu3_cgES9uAhm_hRjbxylEXmCrxoFrBUqM6HYEnUbsPLAl00C-B_o4DLuLu9WA9bF2SGXN5Apc8Ig1qixdYt03yg9-gjl7WiLnjVIS_TkahZkbR_9VdPmkmFaTd0X-baIJf37trTjCU_UjZch7wRyoOI47OqD\/s728\/image.psd(1).png","datePublished":"2022-10-20T09:32:21+00:00","dateModified":"2022-10-20T09:32:23+00:00","description":"Matano is an open source security lake platform for AWS. It lets you ingest petabytes of security and log data from various sources, store","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/matano\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/matano\/#primaryimage","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi7LcFlmSyKRgBm6WtuQ_x651wxZVATu3_cgES9uAhm_hRjbxylEXmCrxoFrBUqM6HYEnUbsPLAl00C-B_o4DLuLu9WA9bF2SGXN5Apc8Ig1qixdYt03yg9-gjl7WiLnjVIS_TkahZkbR_9VdPmkmFaTd0X-baIJf37trTjCU_UjZch7wRyoOI47OqD\/s728\/image.psd(1).png","contentUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi7LcFlmSyKRgBm6WtuQ_x651wxZVATu3_cgES9uAhm_hRjbxylEXmCrxoFrBUqM6HYEnUbsPLAl00C-B_o4DLuLu9WA9bF2SGXN5Apc8Ig1qixdYt03yg9-gjl7WiLnjVIS_TkahZkbR_9VdPmkmFaTd0X-baIJf37trTjCU_UjZch7wRyoOI47OqD\/s728\/image.psd(1).png","width":"728","height":"380"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad","name":"R K","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","caption":"R K"},"url":"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/"}]}},"jetpack_featured_media_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi7LcFlmSyKRgBm6WtuQ_x651wxZVATu3_cgES9uAhm_hRjbxylEXmCrxoFrBUqM6HYEnUbsPLAl00C-B_o4DLuLu9WA9bF2SGXN5Apc8Ig1qixdYt03yg9-gjl7WiLnjVIS_TkahZkbR_9VdPmkmFaTd0X-baIJf37trTjCU_UjZch7wRyoOI47OqD\/s728\/image.psd(1).png","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":30285,"url":"https:\/\/kalilinuxtutorials.com\/guardduty-runbook-automator\/","url_meta":{"origin":27498,"position":0},"title":"GuardDuty Runbook Automator &#8211; Streamlined Security Responses","author":"Varshini","date":"September 14, 2023","format":false,"excerpt":"Create a runbook for all available GuardDuty finding types found on the\u00a0GuardDuty docs website\u00a0using the information documented for each finding. This project is a kick-start to generate a base set of runbooks when GuardDuty is enabled in an organization. Runbooks will need to be customized to fit organizational incident response\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh-kCHz4aPXOz4QdEzHbBXr-hLa6aOu5W6yfsbsHxTIw9fJV6gYG1qmRe8DpCzJ2QD8CsI2xtpA8dy2UWCG7xJ7jPWSH5hFlIoyQ7fHDvk4PMmvN8t52ZpqOnvXqXvQojbem_tUMQgfNIjsSsK9U46dcnE-ysFqGzcbYY0giB4RLmc3cpE09ZBg5u9fPg\/s16000\/GuardDuty%20Runbook%20Automator%20-%20Streamlined%20Security%20Responses.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh-kCHz4aPXOz4QdEzHbBXr-hLa6aOu5W6yfsbsHxTIw9fJV6gYG1qmRe8DpCzJ2QD8CsI2xtpA8dy2UWCG7xJ7jPWSH5hFlIoyQ7fHDvk4PMmvN8t52ZpqOnvXqXvQojbem_tUMQgfNIjsSsK9U46dcnE-ysFqGzcbYY0giB4RLmc3cpE09ZBg5u9fPg\/s16000\/GuardDuty%20Runbook%20Automator%20-%20Streamlined%20Security%20Responses.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh-kCHz4aPXOz4QdEzHbBXr-hLa6aOu5W6yfsbsHxTIw9fJV6gYG1qmRe8DpCzJ2QD8CsI2xtpA8dy2UWCG7xJ7jPWSH5hFlIoyQ7fHDvk4PMmvN8t52ZpqOnvXqXvQojbem_tUMQgfNIjsSsK9U46dcnE-ysFqGzcbYY0giB4RLmc3cpE09ZBg5u9fPg\/s16000\/GuardDuty%20Runbook%20Automator%20-%20Streamlined%20Security%20Responses.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh-kCHz4aPXOz4QdEzHbBXr-hLa6aOu5W6yfsbsHxTIw9fJV6gYG1qmRe8DpCzJ2QD8CsI2xtpA8dy2UWCG7xJ7jPWSH5hFlIoyQ7fHDvk4PMmvN8t52ZpqOnvXqXvQojbem_tUMQgfNIjsSsK9U46dcnE-ysFqGzcbYY0giB4RLmc3cpE09ZBg5u9fPg\/s16000\/GuardDuty%20Runbook%20Automator%20-%20Streamlined%20Security%20Responses.webp?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":7707,"url":"https:\/\/kalilinuxtutorials.com\/cyberrange-open-source-aws\/","url_meta":{"origin":27498,"position":1},"title":"CyberRange : The Open-Source AWS Cyber Range","author":"R K","date":"December 16, 2019","format":false,"excerpt":"This CyberRange project represents the first open-source Cyber Range blueprint in the world. This project provides a bootstrap framework for a complete offensive, defensive, reverse engineering & security intelligence tooling in a private research lab using the AWS Cloud. This project contains vulnerable systems and a toolkit of the most\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":32346,"url":"https:\/\/kalilinuxtutorials.com\/awesome-incident-response\/","url_meta":{"origin":27498,"position":2},"title":"Awesome Incident Response &#8211; Essential Tools And Resources","author":"Varshini","date":"March 18, 2024","format":false,"excerpt":"Digital Forensics and Incident Response (DFIR) teams are groups of people in an organization responsible for managing the response to a security incident, including gathering evidence of the incident, remediating its effects, and implementing controls to prevent the incident from recurring in the future. Contents Adversary Emulation All-In-One Tools Books\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj0fVIpiLAdx6vftfu3rD1nl1WOF9VjAMJb-2vjxCVFveIX4POIPRYHoHezXaFRwYSYFlannuStRc9IOjZyCwvJhcJKWrlXtj-cEeTXF5uyiv6ViYFiuv70-dwkdEhy8cyy7B0ZW09psJMWdAL0e4buxlAg_EtY_UxpycxSBR4pYECA5BpUHxdqKkaOa9rM\/s16000\/StopCrypt%20Ransomware%20%281%29%20%281%29.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj0fVIpiLAdx6vftfu3rD1nl1WOF9VjAMJb-2vjxCVFveIX4POIPRYHoHezXaFRwYSYFlannuStRc9IOjZyCwvJhcJKWrlXtj-cEeTXF5uyiv6ViYFiuv70-dwkdEhy8cyy7B0ZW09psJMWdAL0e4buxlAg_EtY_UxpycxSBR4pYECA5BpUHxdqKkaOa9rM\/s16000\/StopCrypt%20Ransomware%20%281%29%20%281%29.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj0fVIpiLAdx6vftfu3rD1nl1WOF9VjAMJb-2vjxCVFveIX4POIPRYHoHezXaFRwYSYFlannuStRc9IOjZyCwvJhcJKWrlXtj-cEeTXF5uyiv6ViYFiuv70-dwkdEhy8cyy7B0ZW09psJMWdAL0e4buxlAg_EtY_UxpycxSBR4pYECA5BpUHxdqKkaOa9rM\/s16000\/StopCrypt%20Ransomware%20%281%29%20%281%29.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj0fVIpiLAdx6vftfu3rD1nl1WOF9VjAMJb-2vjxCVFveIX4POIPRYHoHezXaFRwYSYFlannuStRc9IOjZyCwvJhcJKWrlXtj-cEeTXF5uyiv6ViYFiuv70-dwkdEhy8cyy7B0ZW09psJMWdAL0e4buxlAg_EtY_UxpycxSBR4pYECA5BpUHxdqKkaOa9rM\/s16000\/StopCrypt%20Ransomware%20%281%29%20%281%29.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj0fVIpiLAdx6vftfu3rD1nl1WOF9VjAMJb-2vjxCVFveIX4POIPRYHoHezXaFRwYSYFlannuStRc9IOjZyCwvJhcJKWrlXtj-cEeTXF5uyiv6ViYFiuv70-dwkdEhy8cyy7B0ZW09psJMWdAL0e4buxlAg_EtY_UxpycxSBR4pYECA5BpUHxdqKkaOa9rM\/s16000\/StopCrypt%20Ransomware%20%281%29%20%281%29.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj0fVIpiLAdx6vftfu3rD1nl1WOF9VjAMJb-2vjxCVFveIX4POIPRYHoHezXaFRwYSYFlannuStRc9IOjZyCwvJhcJKWrlXtj-cEeTXF5uyiv6ViYFiuv70-dwkdEhy8cyy7B0ZW09psJMWdAL0e4buxlAg_EtY_UxpycxSBR4pYECA5BpUHxdqKkaOa9rM\/s16000\/StopCrypt%20Ransomware%20%281%29%20%281%29.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":32260,"url":"https:\/\/kalilinuxtutorials.com\/awesome-security\/","url_meta":{"origin":27498,"position":3},"title":"Awesome Security &#8211; A Comprehensive Guide To Tools And Resources For Unlocking Digital Safety","author":"Varshini","date":"March 11, 2024","format":false,"excerpt":"A collection of awesome software, libraries, documents, books, resources and cool stuff about security. Inspired by\u00a0awesome-php,\u00a0awesome-python. Thanks to all\u00a0contributors, you're awesome and wouldn't be possible without you! The goal is to build a categorized community-driven collection of very well-known resources. Awesome Security Network Scanning \/ Pentesting Monitoring \/ Logging IDS\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjDCY_P_WCdx-sIy9IKcYFKo65-LloxgwXpMLKs0PwVOL2yGelMKfASEVgVpMYhGshXNMel0pusBmAQ7w02u0-xEYTiNCJbRmCtY2OsrSXPRVUbXa4oGxpGhEpQZDvLMkItJC1MPH9lGYEFjWcdvW7uMWTrWU_0hO454wYvexHX5V8FkUS_XX7c9ceJvP9_\/s16000\/Awesome%20AppSec%20%282%29.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjDCY_P_WCdx-sIy9IKcYFKo65-LloxgwXpMLKs0PwVOL2yGelMKfASEVgVpMYhGshXNMel0pusBmAQ7w02u0-xEYTiNCJbRmCtY2OsrSXPRVUbXa4oGxpGhEpQZDvLMkItJC1MPH9lGYEFjWcdvW7uMWTrWU_0hO454wYvexHX5V8FkUS_XX7c9ceJvP9_\/s16000\/Awesome%20AppSec%20%282%29.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjDCY_P_WCdx-sIy9IKcYFKo65-LloxgwXpMLKs0PwVOL2yGelMKfASEVgVpMYhGshXNMel0pusBmAQ7w02u0-xEYTiNCJbRmCtY2OsrSXPRVUbXa4oGxpGhEpQZDvLMkItJC1MPH9lGYEFjWcdvW7uMWTrWU_0hO454wYvexHX5V8FkUS_XX7c9ceJvP9_\/s16000\/Awesome%20AppSec%20%282%29.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjDCY_P_WCdx-sIy9IKcYFKo65-LloxgwXpMLKs0PwVOL2yGelMKfASEVgVpMYhGshXNMel0pusBmAQ7w02u0-xEYTiNCJbRmCtY2OsrSXPRVUbXa4oGxpGhEpQZDvLMkItJC1MPH9lGYEFjWcdvW7uMWTrWU_0hO454wYvexHX5V8FkUS_XX7c9ceJvP9_\/s16000\/Awesome%20AppSec%20%282%29.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjDCY_P_WCdx-sIy9IKcYFKo65-LloxgwXpMLKs0PwVOL2yGelMKfASEVgVpMYhGshXNMel0pusBmAQ7w02u0-xEYTiNCJbRmCtY2OsrSXPRVUbXa4oGxpGhEpQZDvLMkItJC1MPH9lGYEFjWcdvW7uMWTrWU_0hO454wYvexHX5V8FkUS_XX7c9ceJvP9_\/s16000\/Awesome%20AppSec%20%282%29.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjDCY_P_WCdx-sIy9IKcYFKo65-LloxgwXpMLKs0PwVOL2yGelMKfASEVgVpMYhGshXNMel0pusBmAQ7w02u0-xEYTiNCJbRmCtY2OsrSXPRVUbXa4oGxpGhEpQZDvLMkItJC1MPH9lGYEFjWcdvW7uMWTrWU_0hO454wYvexHX5V8FkUS_XX7c9ceJvP9_\/s16000\/Awesome%20AppSec%20%282%29.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":2002,"url":"https:\/\/kalilinuxtutorials.com\/scout2-security-auditing-aws\/","url_meta":{"origin":27498,"position":4},"title":"Scout2 &#8211; Security Auditing Tool For AWS Environments","author":"R K","date":"July 23, 2018","format":false,"excerpt":"Scout2 is a security tool that lets AWS administrators assess their environment's security posture. Using the AWS API, Scout2 gathers configuration data for manual inspection and highlights high-risk areas automatically. Rather than pouring through dozens of pages on the web, Scout2 supplies a clear view of the attack surface automatically.\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":6642,"url":"https:\/\/kalilinuxtutorials.com\/scout-suite-multi-cloud-security-auditing-tool\/","url_meta":{"origin":27498,"position":5},"title":"Scout Suite : Multi-Cloud Security Auditing Tool","author":"R K","date":"September 28, 2019","format":false,"excerpt":"Scout Suite is an open source multi-cloud security-auditing tool, which enables security posture assessment of cloud environments. Using the APIs exposed by cloud providers, Scout Suite gathers configuration data for manual inspection and highlights risk areas. Rather than going through dozens of pages on the web consoles, Scout Suite presents\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/27498","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=27498"}],"version-history":[{"count":3,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/27498\/revisions"}],"predecessor-version":[{"id":27502,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/27498\/revisions\/27502"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/27500"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=27498"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=27498"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=27498"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}