Cloud Security Audit is a command line tool that scans for vulnerabilities in your AWS Account. In easy way you will be able to identify unsecure parts of your infrastructure and prepare your AWS account for security audit.
Installation
Currently it does not support any package managers, but the work is in progress.
First of all you need to download it to your GO workspace:
$GOPATH $ go get github.com/Appliscale/cloud-security-audit
$GOPATH $ cd cloud-security-audit
Then build and install configuration for the application inside cloud-security-audit directory by executing:
cloud-security-audit $ make all
Also Read – DarkScrape : OSINT Tool For Scraping Dark Websites
If you’re using MFA you need to tell it to authenticate you before trying to connect by using flag --mfa
. Example:
$ cloud-security-audit –service s3 –mfa –mfa-duration 3600
To perform audit on all EC2 instances, type:
$ cloud-security-audit –service ec2
You can narrow the audit to a region, by using the flag -r
or --region
. It also supports AWS profiles – to specify profile use the flag -p
or --profile
.
Docs
You can find more information about encryption in the following documentation:
https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/EBSEncryption.html
S3 Scan
To perform audit on all S3 buckets, type:
$ cloud-security-audit –service s3
It supports AWS profiles – to specify profile use the flag -p
or --profile
.
Docs
You can find more about securing your S3’s in the following documentations:
Playwright-MCP (Model Context Protocol) is a cutting-edge tool designed to bridge the gap between AI…
JBDev is a specialized development tool designed to streamline the creation and debugging of jailbreak…
The Kereva LLM Code Scanner is an innovative static analysis tool tailored for Python applications…
Nuclei-Templates-Labs is a dynamic and comprehensive repository designed for security researchers, learners, and organizations to…
SSH-Stealer and RunAs-Stealer are malicious tools designed to stealthily harvest SSH credentials, enabling attackers to…
Control flow flattening is a common obfuscation technique used by OLLVM (Obfuscator-LLVM) to transform executable…