Security auditing and tools for AWS security assessment, compliance checking, and vulnerability detection.
auditPerform basic security audit of AWS account.
aws-cloud-utilities security audit
Checks:
Options:
--service SERVICE - Audit specific service--severity LEVEL - Filter by severity (low, medium, high, critical)--compliance-framework FRAMEWORK - Check against specific frameworkExamples:
# Basic security audit
aws-cloud-utilities security audit
# High severity issues only
aws-cloud-utilities security audit --severity high
# S3 security audit
aws-cloud-utilities security audit --service s3
blue-team-auditComprehensive security assessment for blue team operations.
aws-cloud-utilities security blue-team-audit
Enhanced checks:
Options:
--detailed - Include detailed findings--export-format FORMAT - Export format for reports--include-remediation - Include remediation stepsExamples:
# Comprehensive audit
aws-cloud-utilities security blue-team-audit
# Detailed report with remediation
aws-cloud-utilities security blue-team-audit --detailed --include-remediation
# Export to JSON
aws-cloud-utilities security blue-team-audit --output json > security-audit.json
public-resourcesFind publicly accessible AWS resources.
aws-cloud-utilities security public-resources
Detects:
Options:
--service SERVICE - Check specific service--region REGION - Check specific region--severity LEVEL - Filter by risk levelExamples:
# All public resources
aws-cloud-utilities security public-resources
# Public S3 buckets only
aws-cloud-utilities security public-resources --service s3
# High-risk exposures
aws-cloud-utilities security public-resources --severity high
complianceCheck compliance against security frameworks.
aws-cloud-utilities security compliance --framework FRAMEWORK
Supported frameworks:
Options:
--framework FRAMEWORK - Compliance framework--control CONTROL - Specific control check--export-report - Generate compliance reportExamples:
# CIS compliance check
aws-cloud-utilities security compliance --framework cis
# SOC 2 compliance
aws-cloud-utilities security compliance --framework soc2
# Specific control
aws-cloud-utilities security compliance --framework cis --control 1.1
encryption-statusCheck encryption status across AWS services.
aws-cloud-utilities security encryption-status
Checks:
Options:
--service SERVICE - Check specific service--unencrypted-only - Show only unencrypted resourcesExamples:
# All encryption status
aws-cloud-utilities security encryption-status
# Unencrypted resources only
aws-cloud-utilities security encryption-status --unencrypted-only
# S3 encryption status
aws-cloud-utilities security encryption-status --service s3
network-analysisAnalyze network security configuration.
aws-cloud-utilities security network-analysis
Analysis includes:
Options:
--vpc-id VPC - Analyze specific VPC--show-flows - Include flow log analysis--risky-rules-only - Show only risky rulesExamples:
# All network analysis
aws-cloud-utilities security network-analysis
# Specific VPC
aws-cloud-utilities security network-analysis --vpc-id vpc-12345678
# Risky rules only
aws-cloud-utilities security network-analysis --risky-rules-only
secrets-scanScan for exposed secrets and credentials.
aws-cloud-utilities security secrets-scan
Scans:
Options:
--service SERVICE - Scan specific service--pattern PATTERN - Custom secret pattern--exclude-encrypted - Skip encrypted valuesExamples:
# Full secrets scan
aws-cloud-utilities security secrets-scan
# Lambda functions only
aws-cloud-utilities security secrets-scan --service lambda
# Custom pattern
aws-cloud-utilities security secrets-scan --pattern "api[_-]?key"
All security commands support:
--profile PROFILE - AWS profile to use--region REGION - AWS region--output FORMAT - Output format (table, json, yaml, csv)--verbose - Enable verbose output--debug - Enable debug mode#!/bin/bash
# Daily security monitoring
echo "=== Security Audit ==="
aws-cloud-utilities security audit --output json > daily-audit-$(date +%Y%m%d).json
echo "=== Public Resources ==="
aws-cloud-utilities security public-resources --output json > public-resources-$(date +%Y%m%d).json
echo "=== Encryption Status ==="
aws-cloud-utilities security encryption-status --unencrypted-only
#!/bin/bash
# Full security assessment
echo "=== Blue Team Audit ==="
aws-cloud-utilities security blue-team-audit --detailed --include-remediation
echo "=== Compliance Check ==="
aws-cloud-utilities security compliance --framework cis
echo "=== Network Analysis ==="
aws-cloud-utilities security network-analysis
echo "=== Secrets Scan ==="
aws-cloud-utilities security secrets-scan
#!/bin/bash
# Security incident response
echo "=== Public Exposures ==="
aws-cloud-utilities security public-resources --severity high
echo "=== Network Security ==="
aws-cloud-utilities security network-analysis --risky-rules-only
echo "=== Recent Changes ==="
aws-cloud-utilities security audit --severity critical
aws-cloud-utilities security audit
aws-cloud-utilities security public-resources
aws-cloud-utilities security compliance --framework cis --export-report
aws-cloud-utilities security blue-team-audit --detailed
aws-cloud-utilities security public-resources --severity high
aws-cloud-utilities security network-analysis --risky-rules-only
aws-cloud-utilities security encryption-status --unencrypted-only
aws-cloud-utilities security secrets-scan
Security findings include:
Example output:
{
"severity": "HIGH",
"resource": "s3://my-bucket",
"finding": "S3 bucket allows public read access",
"remediation": "Remove public read permissions from bucket policy",
"compliance": ["CIS-2.3", "SOC2-CC6.1"]
}
Security commands integrate well with:
aws-cloud-utilities iam analyzeaws-cloud-utilities s3 security-auditaws-cloud-utilities networking security-groupsaws-cloud-utilities inventory resources